Managing Cloud Access Permissions Is a Top CISO Concern
How the least privilege principle can reduce data threats and how an automated approach can help manage and monitor cloud access policies and permissions for applications and services.
In the wake of the global pandemic, human identities have emerged as a top security concern for CISOs. In this recent Toolbox article, we take a closer look at how data threats can be reduced by the least privilege principle, and how managing and monitoring cloud access policies and permissions for applications and services can be automated.
Our recent IDC survey found that more than 71% of respondents cited detection of excessive permission in the cloud as either very important or extremely important. The same survey found that only 20% of respondents reported that they were able to identify when their employees had excessive access to sensitive data. There is a clear gap between the importance attributed to the issue, and the limited capabilities of decision-makers.