Sonrai Security website logo for identity and data governance and cloud security

Pillars of Cloud Security: Achieving and Maintaining Least Privilege

Go Back
Webinar Featured Image
On Demand
Presented By
Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
Watch Now

Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

  • What is least privilege and how has it changed in the cloud?
  • Why is it that least privilege cannot be achieved without knowing effective permissions?
  • Why must maintaining least privilege configurations be automated?
  • What are the risks and benefits?

You Might Also Like

Webinar Featured Image
Webinar Image 2
Webinar Image 3