The 7 Hottest Cloud Security Products At RSA Conference
From identifying unsecured AWS S3 buckets and centrally managing EC2 instances to preventing risks around new SaaS applications, here’s a look at seven products that mitigate cloud security threats.
ThycoticCentrify Cloud Provider Solution
ThycoticCentrify’s new cloud provider solutions centrally manages Amazon Web Services billing accounts, identity and access management (IAM) accounts, and AWS EC2 instances in real-time. It extends a set of existing privileged access management capabilities to automate continuous discovery of all AWS EC2 instances, providing full visibility of instances even in elastic auto-scaling groups.
AWS root/billing accounts are vaulted for emergency access only, ThycoticCentrify said, and interactive access to AWS Accounts via the AWS Management Console, AWS CLI, SDKs, and APIs is controlled. AWS IAM accounts and associated Access Keys are eliminated or vaulted to reduce the attack surface, with SAML-based federated single sign-on providing a more secure and lower maintenance alternative.
Continuous EC2 discovery and post-discovery automations allow for complete and accurate visibility, ensuring that EC2 instances and their privileged accounts are immediately secured and brought under centralized management. ThycoticCentrify’s cloud provider solution is initially available for AWS and will soon be extended to Microsoft Azure and other cloud provider platforms.