Skip to main content

Real World Cloud Attack 1: Exploiting Misconfigured Cloud Identities

Growing cloud adoption introduces the need to manage new Identity and Access Management (IAM) permissions and entitlements to access cloud infrastructure and services. When left uncontrolled, these permissions drastically expand the attack surface and increase risk. This video walks through a real world attack on over permissioned identities.

Access our eBook on Real-World Cloud Attacks to learn more.