The Role of Identity and Entitlements in the Cloud Security Stack
In a recent article for TMCNet, Ermetic co-founder and CEO Shai Morag takes a closer look at how the recent massive adoption of public cloud services has created an ever-growing attack surface. He posits that while this scenario poses significant challenges, he knows that the root of security remains identities and entitlements. Shai explains that […]
In a recent article for TMCNet, Ermetic co-founder and CEO Shai Morag takes a closer look at how the recent massive adoption of public cloud services has created an ever-growing attack surface. He posits that while this scenario poses significant challenges, he knows that the root of security remains identities and entitlements.
Shai explains that bringing enhanced security to hybrid/multi-cloud systems begins with visibility. Clearly seeing and understanding the complex relationships between identity, entitlements, and resources is the key to building out an effective security plan including the implementation of identity and entitlement management into the security stack.