Real World Cloud Attack 1: Exploiting Misconfigured Cloud Identities

April 16, 2021

Growing cloud adoption introduces the need to manage new Identity and Access Management (IAM) permissions and entitlements to access cloud infrastructure and services. When left uncontrolled, these permissions drastically expand the attack surface and increase risk. This video walks through a real world attack on over permissioned identities.

Access our eBook on Real-World Cloud Attacks to learn more.

Previous Article
CyberArk Cloud Entitlements Manager – Streamlined Onboarding at Enterprise Scale
CyberArk Cloud Entitlements Manager – Streamlined Onboarding at Enterprise Scale

Next Article
Cloud Identity and Access Management Alphabet Soup: A Definitive Guide
Cloud Identity and Access Management Alphabet Soup: A Definitive Guide

Successful digital transformation depends on the security of your cloud environment. Modern organizations r...