Session
Shadow Access: The Peril of Entra ID Privilege Sprawl
Over-privileged and unmanaged identities, especially with the rise of machine and hybrid accounts, create dangerous vectors for attackers to escalate access and compromise critical data. Zero Trust policies and automated privilege management can efficiently prevent privilege misuse and minimize breach impacts. In this session we cover:
- Auditing and continuously monitoring both human and non-human identity privileges.
- Enforcing least-privilege principles and automate privilege reviews.
- Limiting life span and scope of secrets/API credentials.
- Segregating access by environment and validating use cases for privilege elevation.
Lock down you environment by implementing effective privilege controls, continuous audit, and removing excessive legacy permissions to close common attack paths.
Alistair Pugin
Microsoft MVP | Speaker | Blogger | Podcaster | Do-er@Celyntis
Cape Town, South Africa
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top