The Solution: Sonrai’s Cloud Permissions Firewall with WALLy AI Agent
The organization deployed Sonrai Security’s Cloud Permissions Firewall powered by its embedded AI agent, WALLy, across all AWS accounts. The solution was designed to meet the team’s core requirements: full automation, zero manual operations, and audit readiness by the deadline.
Cloud-Native Enforcement at Scale
Sonrai’s Cloud Permissions Firewall uses AWS Service Control Policies (SCPs) as the primary enforcement mechanism, implementing an approved-services allowlist model that blocks all non-approved services at the organization level.
Intelligent Service Disablement
WALLy analyzed the full privilege landscape to identify which services were unused, distinguish critical risk from expected use, and plan a phased remediation approach. A 30/60/90-day rollout plan was designed to disable unused services, starting with the lowest-risk services and progressing to production and QA environments, ensuring zero disruption to running workloads.
Automated Zombie Identity Quarantine
The Cloud Permissions Firewall enforces a 90-day inactivity threshold for identity quarantine. Dormant identities are automatically staged for quarantine and eventual deletion, eliminating potential attacker entry points without manual intervention.
Just-in-Time Access with Zero Friction
Standing privileges were replaced with time-boxed, approval-based access. The solution integrates with ChatOps tools for approval notifications, delivering zero end-user friction. When engineers need elevated access, they request it in real time, receive rapid approval, and access is automatically revoked when the session expires.
Full Infrastructure-as-Code Compatibility
All policy and control changes are performed through integration with existing Infrastructure-as-Code (IaC) tools, with no manual console operation required at any stage of deployment, management, or enforcement.
SIEM/SOAR Integration and Audit Readiness
Audit logs feed directly into the organization’s enterprise SIEM/SOAR platform, providing full traceability of every access request, approval, denial, and abandonment. This immutable audit trail directly satisfied the hard audit deadline, giving the security team verifiable evidence that non-approved services were blocked and all access activity was logged.
Proactive Risk Surfacing
WALLy continuously analyzes the privilege landscape and proactively surfaces anomalies, eliminating the blind spots the team previously experienced. By fixing the underlying identity and permission issues, the Cloud Permissions Firewall directly reduced alert noise from overlapping security tooling.