Real World Cloud Attack 1: Exploiting Misconfigured Cloud Identities

April 16, 2021

Growing cloud adoption introduces the need to manage new Identity and Access Management (IAM) permissions and entitlements to access cloud infrastructure and services. When left uncontrolled, these permissions drastically expand the attack surface and increase risk. This video walks through a real world attack on over permissioned identities.

Access our eBook on Real-World Cloud Attacks to learn more.

Previous Video
Real World Cloud Attack 2: Embedded Credentials in Code
Real World Cloud Attack 2: Embedded Credentials in Code

Just as credentials in code residing on premises could be compromised and used to escalate privileges, the ...

Next Video
Bridging the Cyber Divide: Episode 7 - Navigating Privacy and Law
Bridging the Cyber Divide: Episode 7 - Navigating Privacy and Law

Mike Trovato, Managing Director at Information Integrity Solutions and Thomas Fikentscher, Regional Directo...

Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM

Download Now