Preventing Cloud Access Mismanagement – Lessons from the Codefinger Ransomware Attack

May 29, 2025

Cloud environments are prime targets for cybercriminals, with mismanaged access often being the weakest link. The Codefinger ransomware attack is a stark reminder of the risks associated with persistent credentials and insufficient monitoring. In this webinar, we’ll analyze how attackers exploited AWS keys to encrypt data and demand ransom—highlighting the need for granular access control. More importantly, we’ll explore how Zero Standing Privileges (ZSP) and Time, Entitlements, and Approvals (TEA) frameworks can proactively mitigate such threats while maintaining developer productivity. Join us to learn how to secure cloud access without slowing innovation.

Previous Video
Cloud-First, Secure Always: CyberArk Identity Security on AWS
Cloud-First, Secure Always: CyberArk Identity Security on AWS

See how modern identity security protects your cloud without compromising speed or control

Next Video
Enhancing Cloud Security in Finance
Enhancing Cloud Security in Finance

This on-demand webinar features cybersecurity leaders from Accenture, AWS, and CyberArk discussing how fina...