Sonrai Security website logo for identity and data governance and cloud security

Identities Are The New Perimeter For Securing Data In Public Cloud

Go Back
Webinar Featured Image
On-Demand Webinar
Presented By
Sandy Bird, CTO and Co-founder, Sonrai Security
Watch Now

Organizations of all sizes are harnessing the operational and cost benefits of public cloud. Unfortunately, cloud platforms like AWS, Azure, and GCP provide a wide range of identity and access management (IAM) based configuration options, that can be disastrous if not properly architected. During this webinar, you will learn the benefits and risk trade-offs of multiple public cloud IAM configuration options including:

  • Organization/Account-wide privilege
  • Privilege delegation & escalation (by user or role)
  • Service-based & in-line privilege
  • Understanding of IAM policy best practices and conflict resolution

Enterprises building in public cloud must ensure their security programs tightly control trust relationships that can be configured from IAM options to ensure adherence to the principles of least privilege and the segregation of duties. Public cloud IAM capabilities can be highly effective to build secure applications when done well. However, they can lead to a disastrous breach when poorly configured.

You Might Also Like

Webinar Featured Image
Webinar Image 2
Webinar Image 3