AWS re:Invent 2018: How AWS Minimizes the Blast Radius of Failures (ARC338)

How To Minimize Your Cloud Breach Blast Radius

Reading Time: 5 minutes Understand how to measure the blast radius and get the total impact of a potential security event in your public cloud ...
principle of least privilege

Cloud Security: Maintaining Least Privilege

Reading Time: 8 minutes There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations ...
sonrai workflow and automation bots icon

Attack Path Analysis: Breaking Down Paths To Your Data

Reading Time: 5 minutes If you’re not focused on identity and access controls, then you are running blind to today’s threat landscape. Today, identity is what creates a pathway to your sensitive ...
Key differences between manual, periodic audits and continuous audit and why Sonrai Dig enables organizations to achieve continuous monitoring for audit.

Effective Permissions: Fact vs. Fiction

Reading Time: 5 minutes Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud ...
azure identity governance

Azure Identity Governance & Security

Reading Time: 6 minutes With 84% of companies experiencing an identity-related breach in the previous year, you’re making the right choice by seeking out azure identity governance and security knowledge. That concerning ...
Identity Governance and Administration (IGA): Is it enough?

Identity Governance and Administration (IGA): Is it enough?

Reading Time: 11 minutes According to the Identity Defined Security Alliance (IDSA)’s study, ”Identity Security: A Work in Progress,” 94% of organizations experienced a data breach, and 79% were breached in the ...
By 2025 Gartner states that 90% of the orgs that fail to control public cloud ise will inappropriately share sensitive data. AWS and Azure privilege escalation blog information.

Real Life Examples of AWS and Azure Privilege Escalation

Reading Time: 8 minutes AWS and Azure privilege escalation attacks are one of the many dangers of managing identities in the cloud. Identity is the new stepping stone for bad actors to ...
privilege escalation types

Privilege Escalation Types and Attack Paths

Reading Time: 7 minutes Every day we see new vulnerabilities being reported that could allow an attacker access to your data, which means it’s time for you to take action. This article ...
privilege escalation

How To Detect Privilege Escalation: An Attack Simulation

Reading Time: 8 minutes Beyond learning what privilege escalation is – an identity, whether it is a user or piece of compute, gaining access to rights or privileges beyond what’s intended for ...
Capital One Data Breach Update: Former Amazon Engineer Convicted

Capital One Data Breach Update: Former Amazon Engineer Convicted

Reading Time: 4 minutes The Office of the Comptroller of the Currency (OCC) issued a Consent Order against Capital One Bank including a civil money penalty for $80,000,000 from a data breach ...