Best Practices for Privileged Access & Secrets Management in the Cloud
Chris Cochrane, Director, Solutions Engineering, CyberArk
In this session, you will have the unique opportunity to learn from real-world scenarios related to privileged access security in cloud environments. Our CyberArk expert will provide insights from lessons learned securing commercial SaaS applications, cloud infrastructure, and internal apps deployed in the cloud including:
Understanding the power of privilege in cloud and why it is so critical to have a dual-accountability security approach
3 real world scenarios: human access models, support for automation, proactive controls and programmatic deployment
Best practices for privilege and secret management in AWS Cloud
Why you should limit use of root accounts
Don’t forget all the cloudy places with human admin access
Succeeding with hybrid cloud environments
Remote Vendor Access
Keep an audit trail of activities
Enforce a Zero Trust Environment vaulting Privileged Cloud Credentials
Видео Best Practices for Privileged Access & Secrets Management in the Cloud канала BC Aware Video Content
In this session, you will have the unique opportunity to learn from real-world scenarios related to privileged access security in cloud environments. Our CyberArk expert will provide insights from lessons learned securing commercial SaaS applications, cloud infrastructure, and internal apps deployed in the cloud including:
Understanding the power of privilege in cloud and why it is so critical to have a dual-accountability security approach
3 real world scenarios: human access models, support for automation, proactive controls and programmatic deployment
Best practices for privilege and secret management in AWS Cloud
Why you should limit use of root accounts
Don’t forget all the cloudy places with human admin access
Succeeding with hybrid cloud environments
Remote Vendor Access
Keep an audit trail of activities
Enforce a Zero Trust Environment vaulting Privileged Cloud Credentials
Видео Best Practices for Privileged Access & Secrets Management in the Cloud канала BC Aware Video Content
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
How to Get Privileged Access Management RightCyberArk Operations Full Course From L1 to L3 - CyberArk Tutorial For Beginners | SecApps LearningAzure Private Endpoint & Private Link explained in plain English with a story & demo in 5 minutesCyberArk EPM v11.5 Installation | Introduction to CyberArk EPMIdentity and Access Management: Technical OverviewCYBR in 10 - HygieneModern Cybersecurity ArchitecturePrivileged Access Management (PAM) Webinar: What You Need to Know | July 2016Introduction to Privileged Access Management [PAM] SolutionCyberark PAM Azure Key Vault NetworkingBest practices for deploying and using Password Manager ProWhy I left INFOSYS | Left ON-SITE Opportunity | UNEMPLOYED now?!Privileged Access ManagementCyberArk IntroductionCyberArk Tutorial | Explore CyberArk In An Hour [CyberArk Tutorial For Beginners] - MindmajixPlatform Management for CyberArk PAM DemoCyberArk & Red Hat Ansible Tower - Integrating w/ Tower Out of the BoxIdentity And Access Management | CISSP Training VideosWhy is Privileged Access Management (PAM) so important?CyberArk Workforce Password Management