Page 55 - Cyber Defense Magazine RSA Edition for 2021
P. 55
The Cloud Permissions Gap across an organization’s cloud infrastructure is exponentially getting more
dangerous as bad actors exploit those identities to exfiltrate sensitive information from growing attack
vectors. By instituting best practices for cloud permissions and entitlements management and leveraging
automated technologies that reinforce those best practices—like CIEM—organizations will be better
suited to protect critical cloud infrastructure resources and identities in their hybrid and multi-cloud
environments. Organizations continuing to prioritize digital transformation and cloud-first strategies are
not complete without a robust, scalable CIEM platform, especially as they strive to implement a Zero
Trust architecture.
To learn more, please check out the following resources:
1) State of Cloud Entitlements Report
2) Achieve Least Privilege at Cloud Scale with a Cloud Infrastructure Entitlement Management (CIEM)
Solution
3) Get a Free Cloud Infrastructure Risk Assessment
About the Author
Raj Mallempati recently joined CloudKnox Security as Chief
Operating Officer, where he is responsible for CloudKnox’s overall
business and go-to-market strategies. Prior to joining CloudKnox,
Raj was most recently the SVP of Marketing at Malwarebytes. Raj
has also held positions as the VP of Global Marketing at MobileIron,
VP of Product Marketing at Riverbed Technology, and was the
Director of Marketing and Business Strategy at VMware. He holds an
MBA from The Wharton School, University of Pennsylvania, MS,
Computer Science from the University of Texas, and a B.Tech from
Indian Institute of Technology, Madras.
55