Transforming Cloud IAM Processes to Address Zero Trust Issues from Shadow Access
Offered By: Cloud Security Alliance via YouTube
Course Description
Overview
Discover strategies to transform cloud IAM processes and address Zero Trust challenges posed by Shadow Access in this 27-minute talk by Venkat Raghavan from the Cloud Security Alliance. Learn how traditional IAM falls short in handling DevOps changes and explore CSA's approach to tackling stealthy, risky cloud data access. Gain insights into closing Zero Trust gaps in cloud environments and enhancing overall security posture.
Syllabus
How to transform your cloud IAM processes to address the Zero Trust issues created by Shadow Access
Taught by
Cloud Security Alliance
Related Courses
Startup EngineeringStanford University via Coursera Developing Scalable Apps in Java
Google via Udacity Cloud Computing Concepts, Part 1
University of Illinois at Urbana-Champaign via Coursera Cloud Networking
University of Illinois at Urbana-Champaign via Coursera Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera