Главная
Study mode:
on
1
Introduction
2
About Sarah Young
3
What is an application identity
4
Principle of least privilege
5
Service to service
6
Nonhuman identity
7
Statistics
8
Solargate
9
Consent phishing
10
GitHub keys
11
Main threats
12
Phishing emails
13
Leaked credentials
14
Sign in logs
15
Audit logs
16
Leaked creds
17
What to do
18
Containment
19
Remediation
20
Proactive use
21
Summary
22
Permissions
23
Demo
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore emerging threats against cloud application identities and learn effective defense strategies in this comprehensive conference talk. Discover how to detect, recover from, and protect against attacks on application identities, including compromised administrators, credentials-in-code, and malicious applications masquerading as legitimate ones. Gain insights into the similarities and differences between defending user accounts and application identities. Understand why adversaries are shifting their focus to application identities as user account security improves. Learn about risky behaviors associated with application identities and how to implement robust protection measures. Delve into topics such as the principle of least privilege, service-to-service interactions, nonhuman identities, and recent cyberattacks like Solargate and consent phishing. Explore practical strategies for containment, remediation, and proactive security measures. Conclude with a demonstration on managing permissions effectively to enhance your cloud application security posture. Read more

Emerging Threats Against Cloud Application Identities and What You Should Do About It

NDC Conferences
Add to list