Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
Cloud Security for Non-Human Serverless Identities
March 23, 2021
Cloud Security for Non-Human Serverless Identities

The serverless model shifts security focus to identities, effective permissions, and data access.

Read More
Cloud Security
October 27, 2020
7 Common Data Misconfigurations for Google Cloud Platform

Seven Common Data Misconfigurations for GCP — and How to Avoid Them Just about every process in the Google Cloud […]

Read More
[Webinar Recap] Secure Multi-Cloud Environments: Intelligent Cloud Security Posture Management
October 1, 2020
[Webinar Recap] Secure Multi-Cloud Environments: Intelligent Cloud Security Posture Management

We recap the important information security and risk management leaders need to know when it comes to Cloud Security Posture Management (CSPM)

Read More
The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions
September 23, 2020
The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Security and risk management leaders need to invest in Cloud Security Posture Management tools like Intelligent CSPM

Read More
Healthcare Data Security: HIPAA and the Principle of Least Privilege
July 14, 2020
Healthcare Data Security: HIPAA and the Principle of Least Privilege

Learn the the principle of least privilege and other security considerations that can help prevent privileged user abuse in healthcare.

Read More
Getting to and Maintaining the Principle of Least Privilege
July 10, 2020
Getting to and Maintaining the Principle of Least Privilege

There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations.

Read More
Four Pillars of Security Operations to De-Risk Your Cloud
June 16, 2020
Four Pillars of Security Operations to De-Risk Your Cloud

Find out how the four major pillars that determine the effectiveness and security of a cloud system can be managed to de-risk your cloud.

Read More
[Webinar Recap] Achieving and Maintaining Least Privilege
June 9, 2020
[Webinar Recap] Achieving and Maintaining Least Privilege

Read our webinar recap to understand how your organization can get to and maintain the Principle of Least Privilege.

Read More
Effective Permissions: Fact vs. Fiction
May 12, 2020
Effective Permissions: Fact vs. Fiction

Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud.

Read More
[Webinar Recap] Identity Security & Secrets Management: Key to Unlocking Public Cloud Security
April 22, 2020
[Webinar Recap] Identity Security & Secrets Management: Key to Unlocking Public Cloud Security

Missed our webinar? Don’t worry. We breakdown the key takeaways from the identity security and secrets management with HashiCorp Vault.

Read More
magnifier