Privileged Identity Management in the Cloud

Every cloud infrastructure can be home to potentially hundreds of thousands of vulnerable privileged accounts. The presence of automated hacking tools means improperly secured privileged logins are almost certain to give hackers free reign on the network and access to customers’ private data, within minutes of an incursion.
Until now privileged accounts and other file-based secrets have proven difficult to secure within large-scale, dynamic Cloud Service Provider (CSP) networks, and many still use humans and first-generation software tools to manage the task.
As a result, improperly secured privileged accounts provide an easily exploited attack surface for hackers and malicious insiders.

read more