This is a repost of the blog I wrote on Google’s Cloud Blog site IAM Recommender helps security professionals enforce the principle of least privilege by identifying and removing unwanted access to Google Cloud Platform (GCP) resources. In our previous blog, we described some best practices for achieving least privilege with less effort using IAM Recommender—which uses machine learning
Author: Abhi Yadav
This is a repost of the blog I published earlier on Google Cloud’s site. As cloud adoption grows, we’re seeing exponential growth in cloud resources. With this we’re also seeing growth in permissions, granted to humans and workloads, to access and change those resources. This introduces potential risks, including the misuse of privileges, that can
This is a repost of a blog I wrote on Google Cloud’s site To help you fine-tune your Google Cloud environment, we offer a family of ‘recommenders’ that suggest ways to optimize how you configure your infrastructure and security settings. But unlike many other recommendation engines, which use policy-based rules, some Google Cloud recommenders use
OneWorld Identity‘s Cameron D’Ambrosi sat down with Shawn Keve and me to discuss the unique challenges of Privileged Identity Management as compared to traditional IAM, aired in the August edition of his “The State of Identity” podcast. Listen to a recording here: Privileged identities come in various forms: they can be elevated accounts on your
Much of what I learned at RSA has stayed with me. Some things surprised me; others confirmed some trends I have been noticing on my own for a bit. More on those later. However, one particular quote really got my attention. It came from keynote speaker Dr. Neil deGrasse Tyson, one of my personal heroes.
In my previous articles, I discussed the 5 growing expectations businesses now have that are driving transformation in the Identity as a Service (IDaaS) industry – what I’ve called “next-generation IDaaS.” In this, my third and final post in the series, I get to toot our own horn a bit and explain how vendors are







