logo

Weak Links in Cloud IAM - Never Trust. Always Verify!

Conference:  RSA Conference 2021

2021-05-17

Abstract

Pen testers poke at misconfigured IAM policies, cloud users open their environments to attack, and attackers target IAM credentials while cryptojacking. Dive into how Identity impacts cloud environments from three different angles: a red team case study, alert analysis from thousands of accounts across three major CSPs, and how cryptojacking malware authors are targeting IAM credentials.

Materials:

Tags: