AWS re:Inforce 2022 - Getting more out of your service control policies, featuring Morgan Stanley

What Are AWS Service Control Policies (SCP)? A Complete Guide

The cloud is all about innovation at a speed never before possible. This can often lead to rapid development sprints and a proliferation of identities and infrastructure – and with that, excessive ...
unknown admins

Top 3 Identity Risks In Enterprise Clouds

Reading Time: 6 minutes After months of offering our Cloud Identity Diagnostic – a report detailing what identity and privilege risks are leaving organizations vulnerable to data breach and business disruption, where ...
Multi Cloud Identity Management: How To Address Security Gaps

Multi Cloud Identity Management: How To Address Security Gaps

| | ciem, Identity & IAM
Multi cloud identity management (IAM) is an increasing reality as a majority of enterprises head towards two or more operating clouds. As businesses expand their cloud estate, the importance of securing identities ...
AWS Permission Boundary: What Is It and How To Use It

AWS Permission Boundary: What Is It and How To Use It

| | Identity & IAM
Reading Time: 6 minutes The extensive set of AWS services and resources can make it challenging to manage permissions effectively. Given the substantial variations in use cases and necessary permissions across different ...
access keys cid

How To Secure Your Lost & Forgotten Access Keys

| | Identity & IAM, lateral movement
Reading Time: 7 minutes What criminal wouldn’t take advantage of a pair of house keys left lying around a cafe table? Those keys give entryway to your home, any valuable possessions inside, ...
Sonrai Expert Corner: Identity Proliferation

CIEM vs IGA: Addressing Cloud Identity Governance

| | ciem, Identity & IAM
Reading Time: 8 minutes Everyone’s goal is the same: protecting enterprise data and resources from malicious attack or exposure. The most efficient way to accomplish that is by managing digital identities and ...
identity based policy

AWS Identity-Based Policy Vs. Resource-Based Policy

| | ciem, Identity & IAM
Reading Time: 7 minutes Granting and Denying Access: Identity-Based Policy Vs. Resource-Based Policy Identity and Access Management (IAM) policies play a pivotal role in controlling access to resources and ensuring the security ...
New Study Backs An Identity-First and Inside-Out Approach to Cloud Security

New Study Backs An Identity-First and Inside-Out Approach to Cloud Security

Reading Time: 4 minutes TechTarget’s Enterprise Strategy Group released a new report detailing why proper management of identity and access is critical to reducing cloud security risk.  The report includes recent market ...
The Sonrai Difference: Toxic Permissions Analyzer

Toxic Permissions Analyzer: See Attack Paths your Existing Solutions Can’t

Reading Time: 6 minutes While exploiting identities and privilege isn’t always the way into an enterprise cloud, it is always involved in malicious data access or a cloud takeover. Imagine enterprise clouds ...
CIEM BUYERS GUIDE

CIEM vs. PAM: Know the Difference

Reading Time: 8 minutes CIEM vs. PAM: Know the Differences in the Cloud Identity Solutions With so many varying environments – cloud, on-premises, and hybrid – and numerous security priorities, there are ...