Sneak Your Way to Cloud Persistence—Shadow Admins Are Here to Stay

Posted on in Presentations

Is your cloud safe? To combat initial efforts from attackers, CyberArk researched new stealthy ways to maintain persistence in public cloud platforms. This session will present Cloud Shadow Admins and take AWS as an example. How could changing one line of IAM policy devastate your entire environment? Join us for live demos and get AWStealth, our open source tool for helping your blue and red teams.

Learning Objectives:
1: Learn about new cloud persistence methods that can be exploited by hackers.
2: Understand the AWS permissions architecture and the inner policies structure.
3: Watch live demos and get open source tool for mitigating the new threat.

Asaf Hecht


Security Research Team Leader, CyberArk

Lavi Lazarovitz


Security Research, CyberArk Software, Inc.

Hackers & Threats

cloud security identity management & governance incident response intrusion prevention/detection access control



Share With Your Community