[Webinar Recap] Achieving and Maintaining Least Privilege

Sonrai Security Marketing

June 9, 2020

Missed our recent webinar? We’ve got you covered. In this post, we review one of the four pillars of cloud security – the Principle of Least Privilege.

The principle means giving an Identity (user, role and/or service) only those privileges which are essential to perform its intended function. The Principle of Least Privilege is widely recognized as a fundamental design consideration for the protection of data and functionality from faults and malicious behavior.

Covering the state in which identities have access to only what they need and nothing more, our experts dive into why getting to and maintaining least privilege has become more complex in the public cloud, the impact of ineffective approaches, and considerations for identity and data access. On May 28, we hosted a webinar with Dan Woods, Principal Analyst at Early Adopter Research and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, who explained the latest methods for bringing least privilege to life.

Ultimate guide to Least Privilege

Our “Pillars of Cloud Security: Achieving and Maintaining Least Privilege” webinar takes a deep dive into finding the most effective approaches to Principle of Least Privilege.  As organizations shift to a modern enterprise, finding the most effective approach becomes more important to govern data and identity access in the public cloud.

Identity is now the new perimeter has created new risks and has changed the security model. Things have changed quickly which can be stressful and complicated creating complexities. IT cloud and governance teams need to assess if you’re meeting this new demand and preventing risk.

This Principle of Least Privilege webinar covers these five areas to help with your cloud data and identity governance strategy:
• Analyze how users access data
• Perform critical application assessment
• Improve separation of roles and access
• Accelerate zero trust optimized for work from home
• Prevention is key. Evaluate risks and gaps

For a more comprehensive look at the five areas covered in this presentation, check out the hour-long webinar.