To protect cloud workloads, security and risk management leaders must ensure they get these fundamentals right
Cloud-native attacks present increasingly complex threats, as bad actors seek to exploit confusion around multi-cloud strategies including access to cloud platforms as well as the workloads moving onto them.
Security and risk management leaders should look to grant least privilege to cloud resources based on granular, role-based access controls using modern, cloud-native, cloud-ready Privileged Access Management (PAM) tools.
Read this complimentary report to learn about:
- Complexity challenges of multi-cloud environments
- 5 things security and risk leaders must get right
- Least privilege access to cloud workloads
- Just enough, just-in-time (JIT) access authenticated with MFA
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Gartner: 5 Things You Must Absolutely Get Right for Secure IaaS and PaaS, Tom Croll, 7 May 2020.