Surviving the Storm: Defending against cloud misconfigurations, vulnerabilities and insider threats

Surviving the Storm: Defending against cloud misconfigurations, vulnerabilities and insider threats

Authored by Milad Aslaner of SentinelOne and Gwenn Cujdik of AXA XL

Over the last decade, Microsoft has expanded its product portfolio from an operating system provider to a company providing various solutions spanning productivity, collaboration, and cloud capabilities. Some organizations today choose Microsoft 365 and Microsoft Azure to consolidate their vendor portfolio while often compromising on best-in-class capabilities. This approach has introduced significant risks to organizations as they become overly dependent on a single vendor.

Today, all Microsoft services are dependent on Azure Active Directory as its primary Identity and Access Management (IAM) solution. With that, the weakest link in a Microsoft environment has become the user identity. When a threat actor can compromise a user identity with elevated privileges like the security administrator role, they can evade all the defense measurements and security tools of Microsoft. In this article, we will look into how to identify and defend against some common cloud vulnerabilities, insider threats, and dangerous cloud misconfigurations.

To read the full article, download this interactive PDF

 

See also  What is guaranteed advantage with Mutual of Omaha?