Posted on
in Presentations
Is your cloud safe? To combat initial efforts from attackers, CyberArk researched new stealthy ways to maintain persistence in public cloud platforms. This session will present Cloud Shadow Admins and take AWS as an example. How could changing one line of IAM policy devastate your entire environment? Join us for live demos and get AWStealth, our open source tool for helping your blue and red teams.
Learning Objectives:
1: Learn about new cloud persistence methods that can be exploited by hackers.
2: Understand the AWS permissions architecture and the inner policies structure.
3: Watch live demos and get open source tool for mitigating the new threat.
Learning Objectives:
1: Learn about new cloud persistence methods that can be exploited by hackers.
2: Understand the AWS permissions architecture and the inner policies structure.
3: Watch live demos and get open source tool for mitigating the new threat.
Share With Your Community