Managing Cloud Access Permissions Is a Top CISO Concern
How the least privilege principle can reduce data threats and how an automated approach can help manage and monitor cloud access policies and permissions for applications and services.
In the wake of the global pandemic, human identities have emerged as a top security concern for CISOs. In this recent Toolbox article, we take a closer look at how to reduce data threats using the least privilege principle and how to automate the management and monitoring of cloud access policies and permissions for applications and services.
Our recent IDC survey found that more than 71% of respondents cited detection of excessive permission in the cloud as either very important or extremely important. The same survey found that only 20% of respondents reported that they were able to identify when their employees had excessive access to sensitive data. There is a clear gap between the importance attributed to the issue, and the limited capabilities of decision-makers.