Sonrai Security website logo for identity and data governance and cloud security

Securing Non-Human Identities Part 2: AWS

Go Back
Webinar Featured Image
On Demand
Presented By
Sandy Bird, CTO, Sonrai Security
Eric Kedrosky, CISO & Director of Cloud Security Research, Sonrai Security
Watch Now

Identities in a modern enterprise public cloud deployment are innumerate and critical to securing your data. Non-person identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

Cloud providers like Azure, AWS, and GCP have given us tools to help govern access, but they can be made insecure by simple configuration errors or omissions - and they're very different approaches, creating complexity for multi-cloud deployments. Governance requires a new approach that meets this new reality of ephemeral compute and complex webs of permission combinations.

This is the second in a two-part series on non-person identities. In this session, we discuss:

  • Recap of what non-person identities are
  • Examples of AWS-specific risks
  • Best practices for managing them
  • Immediate steps anyone can take today to secure the identities

You Might Also Like

Webinar Featured Image
Webinar Image 2
Webinar Image 3