Cloud vendors require extensive access to your organization's cloud environments. This includes security vendors. For example, if a security team wants to use a Cloud Security Posture Management (CSPM) tool to scan their cloud environments, the CSPM needs read access to nearly every service. They are entrusting the CSPM with their cloud data, so the CSPM needs to take great care that this access is not abused.
All software, including security software, can contain vulnerabilities. SANS Instructors and Authors Brandon Evans and Eric Johnson found a critical vulnerability in a popular CSPM, Microsoft Defender for Cloud. With it, under certain, limited circumstances, Defender for Cloud's security findings could be disclosed to unauthorized third parties.
Join Brandon as he discusses widespread issues with cross-cloud integrations, this specific critical vulnerability in Microsoft Defender for Cloud, and how to proactively protect your organization from this class of vulnerabilities. Even if your organization does not use Microsoft Defender for Cloud, if it needs to grant an external service access to your cloud resources, this webcast is a must-watch.
Learning Objectives:
This webcast supports content from SANS Institute SEC510: Cloud Security Controls and Mitigations. To learn more about this course, explore upcoming sessions, and access your FREE demo, click here.