How security teams can tackle the challenge of auditing identity access management systems in their IT Infrastructure.

Illustration of a checklist

Organizations today use SaaS, PaaS, IaaS, and other types of cloud resources as part of their IT infrastructure. All these services come with in-built effortless (a couple of clicks) identity access management (IAM) feature. Amazon Web Services (AWS) includes a very useful feature called AWS IAM to control identity based access management.

Failing to evaluate, monitor and audit all type of improper access to resources is one of the reasons for insider leaks and data breaches. …

Priyal Viroja

Finding faults in our fundamentals

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store