You’ve loaded up the security controls to protect your data
in any of those big name cloud providers.
Ever think about the source network from which that authorized
user is connecting to your internal cloud resources?
The crowded coffee shop in the tech savvy neighborhood.
That potentially unpatched public library.
That international public internet café machine.
Some networks just present more risk. That risk could mean a loss of control of legitimate credentials.
No matter how they are gained, legitimate cloud credentials
turn an outsider into an insider within your cloud network.
Follow me on Twitter
for discussion and the latest blog updates: @Opinionatedsec1. Or, start your
own discussion using #crazygoodcyberteams on twitter or Linkedin and I'll read
it.
SEE ALSO
No comments:
Post a Comment