new way to do least privilege

There’s a New Way To Do Least Privilege

Least privilege. It’s like a love-hate relationship. Everyone knows it’s a best practice, but no one is achieving it at scale.  Why? Because it’s hard to do. The market is constantly trying ...
cloud permissions firewall cta

Defining a Cloud Permissions Firewall

Sonrai recently launched the first-ever Cloud Permissions Firewall – a new class of solution built to more efficiently protect sensitive permissions and access.  A new solution class deserves a proper introduction and ...
AWS re:Inforce 2022 - Getting more out of your service control policies, featuring Morgan Stanley

What Are AWS Service Control Policies (SCP)? A Complete Guide

The cloud is all about innovation at a speed never before possible. This can often lead to rapid development sprints and a proliferation of identities and infrastructure – and with that, excessive ...
unknown admins

Top 3 Identity Risks In Enterprise Clouds

Reading Time: 6 minutes After months of offering our Cloud Identity Diagnostic – a report detailing what identity and privilege risks are leaving organizations vulnerable to data breach and business disruption, where ...
Multi Cloud Identity Management: How To Address Security Gaps

Multi Cloud Identity Management: How To Address Security Gaps

| | ciem, Identity & IAM
Multi cloud identity management (IAM) is an increasing reality as a majority of enterprises head towards two or more operating clouds. As businesses expand their cloud estate, the importance of securing identities ...
AWS Permission Boundary: What Is It and How To Use It

AWS Permission Boundary: What Is It and How To Use It

| | Identity & IAM
Reading Time: 6 minutes The extensive set of AWS services and resources can make it challenging to manage permissions effectively. Given the substantial variations in use cases and necessary permissions across different ...
access keys cid

How To Secure Your Lost & Forgotten Access Keys

| | Identity & IAM, lateral movement
Reading Time: 7 minutes What criminal wouldn’t take advantage of a pair of house keys left lying around a cafe table? Those keys give entryway to your home, any valuable possessions inside, ...
Sonrai Expert Corner: Identity Proliferation

CIEM vs IGA: Addressing Cloud Identity Governance

| | ciem, Identity & IAM
Reading Time: 8 minutes Everyone’s goal is the same: protecting enterprise data and resources from malicious attack or exposure. The most efficient way to accomplish that is by managing digital identities and ...
identity based policy

AWS Identity-Based Policy Vs. Resource-Based Policy

| | ciem, Identity & IAM
Reading Time: 7 minutes Granting and Denying Access: Identity-Based Policy Vs. Resource-Based Policy Identity and Access Management (IAM) policies play a pivotal role in controlling access to resources and ensuring the security ...
New Study Backs An Identity-First and Inside-Out Approach to Cloud Security

New Study Backs An Identity-First and Inside-Out Approach to Cloud Security

Reading Time: 4 minutes TechTarget’s Enterprise Strategy Group released a new report detailing why proper management of identity and access is critical to reducing cloud security risk.  The report includes recent market ...