secure sensitive permissions

April Recap: New AWS Sensitive Permissions

As April 2025 wraps up, we’re back with the latest roundup of AWS sensitive permission updates and key service developments shaping the cloud security landscape. Keeping pace with these changes is critical ...
secure sensitive permissions

A Smarter Alternative to Entra Permissions Management

Microsoft has announced the retirement of Entra Permissions Management (formerly CloudKnox), with sales ending June 30, 2025. EPM offered valuable visibility into cloud permissions, helping teams identify overprivileged identities across AWS, Azure, ...
secure sensitive permissions

March Recap: New AWS Sensitive Permissions and Services

As March 2025 comes to a close, we’re back with the latest round of AWS sensitive permission updates, newly supported services, and key developments across the cloud landscape. Staying current with these ...
secure sensitive permissions

February Recap: New AWS Sensitive Permissions

| | Permission & Access
As February 2025 wraps up, we’re back with the latest updates on AWS sensitive permissions, newly supported services, and regional expansions. Keeping up with these changes is critical for securing cloud environments ...
secure sensitive permissions

January Recap: New AWS Sensitive Permissions and Regions

| | Permission & Access
As January 2025 comes to a close, we’re highlighting the latest updates to sensitive permissions, services, and regions from AWS. Staying informed on these changes is essential for maintaining a strong cloud ...
secure sensitive permissions

December Recap: New AWS Sensitive Permissions and Services

| | Permission & Access
As December 2024 comes to a close, we’re surfacing the latest updates to sensitive permissions and services from AWS. Keeping up with these changes is necessary for maintaining a strong cloud security ...
secure sensitive permissions

November Recap: New AWS Sensitive Permissions and Services

| | Permission & Access
As AWS continues to evolve, new services and permissions are frequently introduced to enhance functionality and security. This blog provides a comprehensive recap of new sensitive permissions and services added in October ...
Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before

Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before

The desire to quickly deploy and maintain third-party tools often leads organizations to grant broad, sometimes excessive permissions in their cloud environments. While this is convenient for onboarding and operations, it creates ...
"Deny All" for Public Buckets: AWS Resource Control Policies (RCP) Extend Centralized Cloud Governance

“Deny All” for Public Buckets: AWS Resource Control Policies (RCP) Extend Centralized Cloud Governance

AWS’s release of Resource Controls Policies (RCP) when used in combination with existing Service Control Policies (SCP), enables Cloud Architects to create an identity perimeter controlling all undesired permissions and access to ...
Unused AWS services lead to unexpected costs. Here’s how to turn them off

Unused AWS services lead to unexpected costs. Here’s how to turn them off

In a company, who owns the cloud? It’s not always clear. Maybe a better question is: who is responsible for the cloud’s cost? That answer is always the head of Operations. This ...