Preventing Cloud Access Mismanagement – Lessons from the Codefinger Ransomware Attack

May 29, 2025

Cloud environments are prime targets for cybercriminals, with mismanaged access often being the weakest link. The Codefinger ransomware attack is a stark reminder of the risks associated with persistent credentials and insufficient monitoring. In this webinar, we’ll analyze how attackers exploited AWS keys to encrypt data and demand ransom—highlighting the need for granular access control. More importantly, we’ll explore how Zero Standing Privileges (ZSP) and Time, Entitlements, and Approvals (TEA) frameworks can proactively mitigate such threats while maintaining developer productivity. Join us to learn how to secure cloud access without slowing innovation.

Previous Video
AI, Human Behavior and the Identity Security Risks You Can’t Ignore
AI, Human Behavior and the Identity Security Risks You Can’t Ignore

Learn about identity security trends from the CyberArk 2025 Identity Security Landscape Report and risk red...

Next Video
Beyond the Breach: Fortifying Identity Security in Incident Response
Beyond the Breach: Fortifying Identity Security in Incident Response

Drawing from real-world incident response engagements, our expert will help you to identify and prioritize ...