Identity Access Management in Google Cloud Platform (GCP IAM): What Security Pros Need to Know
An introduction to GCP’s RBAC mechanism for permission assignments — and how to apply the principles of least privilege to keep your organization secure....
Verizon’s Data Breach Report – Insights for Cloud Security Professionals
Select highlights from Verizon’s recent Data Breach Investigations Report that may interest cloud security professionals — and suggested actions to take....
How to Operationalize a Cloud Security Solution
How to successfully operationalize your cloud security solution in 4 easy steps — and why fast and effective operationalization matters....
Access Undenied on AWS
Introducing our new open-source tool: Access Undenied on AWS. The tool parses AWS AccessDenied CloudTrail events, explains the reasons for them and offers actionable fixes....
The GCP Shared Responsibility Model: Everything You Need to Know
Do you know what your organization is accountable for under the Google Cloud Platform shared responsibility model?...
3 Cloud IAM Security Questions You Must Be Able to Answer
It doesn’t matter if it’s AWS, GCP or Azure IAM, cloud deployment is redefining the work of IAM professionals....
Cloud Identities and the Not So Long and Slightly Winding Road to Governance
A look at Forrester’s roadmap for the deployment and use of CIG to decrease the cloud threat surface and the costs of cloud data protection....
How CSPM and CIEM may Solve your Cloud Compliance Challenges
With compliance essential to your organization, what strategy to take? Can you rely on a standard cloud security posture management tool — or do you need more?...
Keep Your S3 Safe from CloudTrail Auditors
AWSCloudTrailReadOnlyAccess currently allows s3:GetObject for “*” and s3:ListAllMyBuckets. And reading CloudTrail logs may also give access to bucket object keys. Be careful!...
Wayward Sheriffs and Confused Deputies: Risks in GCP Third Party Access
Most GCP third-party vendors ask for permanent service account keys for access -- increasing credential leakage risk. Used correctly, short-lived credentials offer a secure alternative....
Testing the Waters: First Impressions of CloudTrail Lake
Our first impressions of AWS's new managed audit and security lake that allows you to aggregate, immutably store, and query activity logs....
Tracking Adversaries in AWS Using Anomaly Detection
Here’s how to minimize the impact of a breach by identifying malicious actors’ anomalous behavior and taking action....