← Back to Webinars

Pillars of Cloud Security: Achieving and Maintaining Least Privilege

Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

  • What is least privilege and how has it changed in the cloud?
  • Why is it that least privilege cannot be achieved without knowing effective permissions?
  • Why must maintaining least privilege configurations be automated?
  • What are the risks and benefits?