Whether a cloud permission falls into the wrong hands for malicious use, or an employee uses it to introduce new risk, cloud permissions can be powerful and risky tools.
Our teams have analyzed all cloud permissions across AWS, Azure, and GCP, and ranked them by their potential damage. Not only have we ranked them by sensitivity, but have also mapped them to the MITRE ATT&CK framework.
Download the eBook for some examples to watch out for.