c
Jan. 9, 2024, 6:39 p.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by Sonrai Security. Written by Tally Shea. Good security has long been about creating a barrier to entry. It’s been about ‘keeping them out.’ The spotlight, attention, and budget, has been dedicated to that pivotal moment – whether the perimeter is breached or not.This approach worked on-prem (for good reason) but things are different in the cloud.Our big take: securing high-value cloud permissions should be the (time, resources, and budget) priority after perimeter defen...

analysis attention breached breaches budget cloud entry good on-prem perimeter permissions role security sonrai sonrai security spotlight written

More from cloudsecurityalliance.org / Cloud Security Alliance

Information System Security Officer (ISSO)

@ LinQuest | Boulder, Colorado, United States

Project Manager - Security Engineering

@ MongoDB | New York City

Security Continuous Improvement Program Manager (m/f/d)

@ METRO/MAKRO | Düsseldorf, Germany

Senior JavaScript Security Engineer, Tools

@ MongoDB | New York City

Principal Platform Security Architect

@ Microsoft | Redmond, Washington, United States

Staff Cyber Security Engineer (Emerging Platforms)

@ NBCUniversal | Englewood Cliffs, NEW JERSEY, United States