As the saying goes, identity is the new perimeter in the cloud. And let’s face it—it’s true. In the cloud, when almost every action is now an API call, identities and their entitlements are sometimes the only barrier between any resource in your cloud environment and a malicious actor. Effective cloud security programs must include in-depth identity and entitlements management.
In this 90-minute workshop, we’ll focus on how identity and entitlements management applies to cloud environments and its place in a holistic security strategy. We will review the mechanisms and paradigms cloud service providers supply to manage permissions and take a look at how large companies are leveraging Cloud Native Application Protection Platforms (CNAPP) to approach core cloud security challenges. You’ll also gain insight into other cloud security practices, including workload protection, compliance, network security, and cloud data protection.
Topics covered in the workshop include:
- How to identify and address key cloud security challenges
- Common pitfalls and lessons learned from real-world breaches
- In-depth demonstrations of CNAPP use cases, such as how to remediate over-privileged identities using activity log tracking
- How to build scalable security workflows that enable cloud adoption