Sneak Your Way to Cloud Persistence—Shadow Admins Are Here to Stay


Posted on in Presentations

Is your cloud safe? To combat initial efforts from attackers, CyberArk researched new stealthy ways to maintain persistence in public cloud platforms. This session will present Cloud Shadow Admins and take AWS as an example. How could changing one line of IAM policy devastate your entire environment? Join us for live demos and get AWStealth, our open source tool for helping your blue and red teams.

Learning Objectives:
1: Learn about new cloud persistence methods that can be exploited by hackers.
2: Understand the AWS permissions architecture and the inner policies structure.
3: Watch live demos and get open source tool for mitigating the new threat.

Participants
Asaf Hecht

Participant

Security Research Team Leader, CyberArk

Lavi Lazarovitz

Participant

Security Research, CyberArk Software, Inc.

Hackers & Threats

cloud security identity management & governance incident response intrusion prevention/detection access control


Topic

Subtopic


Share With Your Community