Assuming Roles in the Public Cloud: The Good, The Bad, and the Insecure

Assuming Roles in the Public Cloud: The Good, The Bad, and the Insecure

Migrating resources to the public cloud, also known as the “shift-left” mentality, helps organizations to optimize their infrastructure, resources, and staffing, as well as reduce overhead ...
Sonrai Expert Corner: Identity Proliferation

More Cloud Identities, More Problems

Reading Time: 4 minutes It’s no secret large enterprises are struggling to manage cloud identities. In fact, 84% of organizations faced an identity-related security breach in the past year, according to the ...
SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

Securing Against Supply Chain Attacks

Anyone who has been in IT for the last decade knows the risks posed by ransomware and cyberattacks. They have been on our radar as a top concern for many years. But ...
Security Boulevard
principle of least privilege

Cloud Security: Maintaining Least Privilege

Reading Time: 8 minutes There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations ...
hype cycle

2022 Gartner Hype Cycle: Representative Vendor for CIEM

Reading Time: 3 minutes CIEM is at the peak of its ascent, according to Gartner. The analyst’s ‘Hype Cycle for Workload and Network Security, 2022’ was published recently by author Charlie Winckless ...
privilege escalation

How To Detect Privilege Escalation: An Attack Simulation

Reading Time: 8 minutes Beyond learning what privilege escalation is – an identity, whether it is a user or piece of compute, gaining access to rights or privileges beyond what’s intended for ...
aws effective permissions

Avoid AWS Effective Permissions Pitfalls

Reading Time: 5 minutes Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud ...
using least privilege in data breach management

Leveraging Least Privilege in Data Breach Management

Looking back over the past 6 years, and being focused primarily on cloud security with organizations of all sizes and […] The post Leveraging Least Privilege in Data Breach Management appeared first ...
Google cloud (GCP) and principle of least privilege

Practicing The Principle of Least Privilege in Google Cloud

Access management is a fundamental requirement in achieving security, especially with cloud infrastructure. Think of it this way: You wouldn't […] The post Practicing The Principle of Least Privilege in Google Cloud ...
Building a Least Privilege Policy

Least Privilege Policy in the Cloud

Maintaining cloud security is paramount for every organization, regardless of size. One of the biggest problems companies face regarding cybersecurity […] The post Least Privilege Policy in the Cloud appeared first on ...