A field guide to bad permissions, part 3: excessive permissions
The migration of data and infrastructure to the cloud has increased the scale, scope, and complexity of identity security. However, tools for identity security and governance have not fundamentally changed from the on-prem era, leaving security teams struggling to keep up with rising identity-based attacks. Excessive permissions are a major issue in this context, as they result from inaccurate or overly broad permission grants that allow identities to perform actions which were never necessary. This can increase the risk of sensitive data being compromised without accomplishing anything useful for the identity that holds them. To tackle excessive permissions, organizations need to improve visibility into effective permissions and develop business intelligence and metrics to help spot excessive privilege. Automated continuous monitoring of permissions across the stack is also crucial in addressing this issue. Veza's Authorization Graph can connect any identity with its actual permissions to any resource, helping IT and IAM teams validate access decisions and identify employees or machine identities with a high blast radius for prioritizing risk mitigation efforts.
Company
Veza
Date published
Dec. 16, 2023
Author(s)
Kale Bogdanovs
Word count
1243
Language
English
Hacker News points
None found.