Running workloads in public cloud environments opens them to new, cloud-native threats and vulnerabilities. Protecting against excessive permissions and responding quickly when those permissions are abused.
Excessive permissions are frequently mischaracterized as “misconfigurations,” but they are actually the result of permission misuses or abuses by people who shouldn’t have them. Protecting against those excessive permissions is a priority for security teams tasked with protecting publicly hosted cloud workloads.