Managing Privileged Cloud Access

Cloud Access
Author: ISACA
Date Published: 1 April 2020

Organizations often store petabytes of user and consumer data on cloud services, and compliance requirements have made it essential that organizations effectively manage privileged access on these systems. But the nature of Linux can make it difficult for organizations to see who is in the cloud at any given time, which has resulted in breach detection times of more than 200 days. To help you better manage privilege access to the cloud, ISACA® and Cmd have partnered to present the webinar “Who’s in Your Cloud? How Privileged Access Controls Are Leaving You Exposed” on 7 April at 11AM CDT (UTC -5 hours). ISACA members can earn 1 hour of continuing professional education (CPE) by attending this webinar.

Many legacy privileged access management (PAM) solutions address privileged access on Windows but not Linux, leaving the organization vulnerable. In this webinar, John Brunn, head of security at Cmd, will explain how to assess gaps in user attribution and compliance on Linux, why PAM requirements differ for Linux and Windows, how a PAM solution for Linux should function, and how to execute a smart PAM strategy in a Linux cloud.