Webinar: Pillars of Cloud Security: Achieving and Maintaining Least PrivilegeRegister Now

Blog
Blog   •   May 12, 2020

Effective Permissions: Fact vs. Fiction

So your company is now operating in the cloud. It’s exciting, isn’t it?  So many […]

Effective Permissions: Fact vs. Fiction
Blog   •   March 26, 2020

Google Cloud Deep Dive

Understand the top security considerations for Google Cloud.

Google Cloud Deep Dive
Blog   •   March 17, 2020

5 IAM Trends To Watch In 2020

Read to understand the new IAM trends emerging in 2020.

5 IAM Trends To Watch In 2020
Blog   •   February 18, 2020

Azure Security Deep Dive

Understand the top security considerations for Microsoft Azure.

Azure Security Deep Dive
Blog   •   February 11, 2020

AWS Security Deep Dive

Take a deeper look at the top security considerations for AWS.

AWS Security Deep Dive

Webinar: Pillars of Cloud Security: Achieving and Maintaining Least Privilege

Least privilege, the state in which identities have access to only what they need and no more, is ideal for a cloud security environment. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

×