How to implement least privilege in the cloud

The Cloud Security Alliance (CSA) recently took a poll of more than 200 industry experts and found that cloud resource misconfiguration is a leading cause of data breaches. Why? Mainly because identity and privilege management at cloud-scale is extremely challenging. It becomes increasingly more complicated and more challenging over time, as organizations grow and their […]

Arick Goomanovsky By Arick Goomanovsky
How to implement least privilege in the cloud

The Cloud Security Alliance (CSA) recently took a poll of more than 200 industry experts and found that cloud resource misconfiguration is a leading cause of data breaches. Why? Mainly because identity and privilege management at cloud-scale is extremely challenging. It becomes increasingly more complicated and more challenging over time, as organizations grow and their their cloud footprint expands before they establish methods to effectively assign and manage permissions.

A recent article on HelpNet Security takes a look at the steps that organizations are taking towards least privilege in order to mitigate risks associated with the abuse of identities in the cloud.

To read the full article by our co-founder Arick Goomanovsky, head over to HelpNet Security.