CEO of Push Security, Adam Bateman, discusses securing identities in the cloud. Topics include common security mistakes, importance of understanding identities and single sign-on, challenges in identity implementations, monitoring unused permissions, and building tools for flagging risky behavior.
Securing identities in the cloud involves relinquishing control to vendors, necessitating a thorough understanding of limited management capabilities.
Addressing identity security risks requires visibility into dormant and unutilized identities, standardized SSO processes, and proper synchronization of local admin accounts.
Deep dives
Securing Identity in the Cloud
Securing identity in the cloud differs from on-prem solutions, as cloud environments involve seeding control to vendors. Maintaining identity safety requires understanding the limited control available for creation and management.
Common Identity Security Risks
Common identity security risks highlighted include regular user accounts with high privileges, lack of enforced multi-factor authentication, and legacy basic authentication still active. Organizations also overlook emergency break-the-glass accounts and proper synchronization of local admin accounts.
Visibility into Identity Management
The podcast emphasizes the need for visibility into identity management, as numerous unutilized identities can pose security risks. Users often connect various applications for testing purposes, unknowingly expanding the attack surface. Organizations struggle to efficiently delete dormant identities, exacerbating security challenges.
Unified SSO Standards
The conversation explores the importance of unified SSO standards to enhance security measures. Standardizing authentication processes can enable effective risk-based provisioning and reduce the complexity associated with varied SSO standards. Implementing consistent SSO standards delivers a more secure environment across cloud-based and SSO provisioning.
The SaaS attacks matrix community resource mentioned by Adam in the episode can be found here.
Editorial note: Geoff Belknap is an advisor to Push Security.
In this episode:
Where are we going wrong
Finding the missing pieces
Protecting an expanding border
It starts with understanding risk
Thanks to our podcast sponsor, Push Security
Prevent, detect and respond to identity attacks using Push Security’s browser agent. Enable Push’s out-of-the-box controls or integrate Push with your SIEM, XDR and SOAR.Block phishing attacks, detect session hijacking and stop SSO passwords being exposed. Find out what else the Push browser agent can do at pushsecurity.com.
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode