Identity and Access Management (IAM) Security
Secure cloud resources by establishing least-privileged identity access
Read the blog postPrisma Cloud IAM Security calculates net-effective permissions out of the various types of permissions policies within your cloud accounts to enable you to gain control over your cloud entitlements.
Using out-of-the-box policies to detect risky permissions, Prisma Cloud helps remove unwanted access to cloud resources by automatically detecting overly permissive access, and then offering suggestions to rightsize them to achieve least privilege entitlements.
Prisma Cloud RQL enables you to query all relevant IAM entities, including all the relationships among different entities and their effective permissions across cloud environments. For example, you can query who uses email addresses, rather than first itemizing all their entitlements.
Prisma Cloud enables organizations to federate user identities with existing identity providers and management systems to prevent the unnecessary management overhead associated with manual maintenance.
Prisma Cloud analyzes millions of audit events using machine learning to detect anomalous activities that could signal account compromises, insider threats, stolen access keys and other potentially malicious user activities.
Prisma Cloud can automatically suggest permissions adjustments, helping organizations continuously ensure least privilege access.