Skip to content
Search
Back to Blog

Cloud Secure Series: Preparing us for AWS re:Invent

Author: Vibhuti Sinha

Date: 11/16/2017

Leading up to AWS re:Invent, Saviynt will be sharing 8 security dimensions that will help get your cloud infrastructure Cloud Secure. Whether you are migrating your critical workloads to IaaS providers, like AWS, security and compliance remain at the forefront of any organization’s implementation plans.

Strategizing and implementing Access Governance for IaaS services, devOps tools and CI/CD processes requires a deep understanding of their native security model and an intelligent system which could highlight the security gaps and provide visibility on access exposure across these platforms in a single pane of glass.

This brings us to our first Cloud Secure Issue: Getting a ”consolidated access view” is fundamental to access governance. AWS a leading IaaS provider, with its robust IAM framework, provides access permissions to Identities or AWS services via JSON-based AWS IAM policies and roles which are often in large numbers. Saviynt retrieves fine-grained access information on AWS resources by ingesting and parsing JSON based IAM policies and role objects and creates a consolidated access view across AWS accounts.

Consolidated access view provides administrators/infrastructure owners an insight into “who” has access to “what” or “how many high privileged users/roles/policies exist in their AWS accounts?” These security controls provide the overall Access Exposure on critical workloads in the ecosystem

Access visibility is further augmented by understanding “How” the access is provided and its “Context.” With this “single pane of glass” view, administrators can detect access exposure, prevent potential data breaches due to unauthorized or privileged access and above all adhere to the principle of least privileged access in their IaaS environments. Join us here tomorrow as we discuss the next tip for making your infrastructure Cloud Secure!

Related Post

Simplifying Certifications with Intelligence
Simplifying Certifications with Intelligence
READ BLOG
Intelligent Recommendations while Requesting and Approving Access
Intelligent Recommendations while Requesting and Approving Access
READ BLOG
Building Saviynt Intelligence: the World’s Best Access Recommendation Engine
Building Saviynt Intelligence: the World’s Best Access Recommendation Engine
READ BLOG

Report

2024 Identity and Security Trends

Read the Report

Report

Saviynt a Gartner Peer® Insights Customers Choice for IGA

Read the Report

Solution Guide

IGA Buyer's Guide

Read the Guide

Solution Guide

PAM Buyers Guide

Get the Guide

Whitepaper

Get exclusive identity & security insights in your inbox.

Subscribe