Pillars of Cloud Security: Prevent Problems or Fix Them FastRegister Now

Blog
Blog   •   July 29, 2020

New CISO Priorities of 2020

Projects that were high priorities before the WFH era have taken a back seat to new business needs as CISOs shift focus halfway through 2020.

New CISO Priorities of 2020
Blog   •   July 22, 2020

What is Shift Left Testing?

Learn how to incorporate security earlier in your cloud development process by shifting left to integrate teams.

What is Shift Left Testing?
Blog   •   July 10, 2020

Getting to and Maintaining the Principle of Least Privilege

There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations.

Getting to and Maintaining the Principle of Least Privilege
Blog   •   July 7, 2020

An Introduction to Shift-Left Security

Shifting left can drastically reduce your chances of experiencing a data breach or security issue in the public cloud.

An Introduction to Shift-Left Security
Blog   •   June 30, 2020

[Webinar Recap] Locking Down Crown-Jewel Data

Read our webinar recap to understand how your organization can protect crown-jewel data across AWS, Azure, GCP and Kubernetes.

[Webinar Recap] Locking Down Crown-Jewel Data
Blog   •   June 23, 2020

Cloud Complexities Create Chaos

Understand and better manage your organizations sensitive data by reducing the complexity of your public cloud data and identity access.

Cloud Complexities Create Chaos
Blog   •   June 17, 2020

Lessons We Learned From The CIA Data Breach

In the wake of the largest data breach in CIA history, we cover some key learnings on information security for the future.

Lessons We Learned From The CIA Data Breach
Blog   •   June 16, 2020

Sonrai’s 4 Pillars of Security to De-Risk Your Cloud

Find out how the four major pillars that determine the effectiveness and security of a cloud system can be managed to de-risk your cloud.

Sonrai’s 4 Pillars of Security to De-Risk Your Cloud
Blog   •   June 2, 2020

Identities Are Still The New Perimeter

Understand the new perimeter of the modern enterprise and learn how public clouds are shifting the IAM model.

Identities Are Still The New Perimeter
Blog   •   May 19, 2020

Getting to and Maintaining the Principle of Least Privilege

There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations.

Getting to and Maintaining the Principle of Least Privilege
Blog   •   May 12, 2020

Effective Permissions: Fact vs. Fiction

Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud.

Effective Permissions: Fact vs. Fiction

Pillars of Cloud Security: Prevent Problems or Fix Them Fast

The best cloud security teams have a clear categorization of their environments, craft policies and controls appropriate to each, and then handle the alerts that come when controls detect problems. The idea of “Prevent Problems or Fix Them Fast” is to add as much automation as possible to both to remediate problems that are detected or prevent them from occurring in the first place. Just as the controls are adapted to each swimlane of activity, so must the remediation or prevention.

×