Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementSecurity & Business ResilienceAccess ManagementIdentity Management

Zero trust and the role of least privilege for securing cloud workloads

By Corey Williams
Man working on laptop computer
October 20, 2021

If we have learned anything over the past year and a half, it’s that the world can change quickly. The business world has gone through a massive upheaval with the explosion of digital transformation initiatives and cloud adoption, which has created a wide array of new security concerns — most notably identity-based risks. Combine the fact that any identity can become privileged under certain circumstances with the massive number of human and machine identities being created across hybrid environments, and you’ve got an attack surface that is getting harder and harder to defend.

The acceleration of digital transformation has brought an end to the traditional network security perimeter. Instead, organizations rely on identity as a security barrier, with the need to implement a zero trust framework to reinforce this new perimeter. Zero trust is an approach that does not assume implicit trust on any corporate resources, no matter where they reside — in the cloud, from home, mobile, etc. — instead requiring that every identity reestablish trust for every session with a corporate resource. A recent survey found that 88% of security leaders say transitioning to a zero trust approach is “important” or “very important.”

A zero trust strategy also helps organizations as they look to gain greater enterprise visibility and reduced IT complexity, demand less of their security teams and more. Let’s explore the key concepts of a strong, modern zero trust model.

The least privilege concept

To address the challenge of identity sprawl, organizations should rely heavily on the principle of least privilege — a zero trust policy requiring that all identities, both human and non-human, have only the minimum entitlements necessary to perform their ongoing responsibilities. Least privilege not only eliminates excessive permissions, but also limits the number of entities that can grant or configure new permissions, making it difficult for attackers who compromise a given identity to escalate privileges and ultimately reach their goals.

Indeed, the concept of least privilege is a pivotal step in establishing strong zero trust frameworks, staying ahead of attackers and proactively shrinking the attack surface. 

Proactive protection

Attackers are smart. They are well aware of the trends influencing enterprise tech decisions and know how to take advantage — recently, they have shifted their attention to the cloud as organizations’ cloud footprints have grown. While the territory is new, they have not varied in their targets all that much. In fact, the 2020 Verizon Data Breach Investigations Report found that identities remain the weakest link in most organizations, as credential theft was employed in 77% of cloud breaches. It is clear attackers know identities are an easy target, which only reinforces the case for least privilege.

In a least privilege model, organizations proactively protect themselves from insider threats while also limiting the potential damage of external attacks. Least privilege controls help limit attacker movement and protect mission-critical workloads, buying valuable time to detect and respond to an attack.

Shrink the ever-expanding attack surface 

Most organizations are now maintaining hybrid or multi-cloud environments, making proper configuration of privileges and permissions a challenge. For example, cloud identity and access management (IAM) roles for certain application services can be provided with a wide range of permissions. In fact, there are over 15,000 permissions across AWS, Azure and the Google Cloud platform. While an excessive number of permissions limits developer friction, it also has significant security implications, as any IAM permission can be weaponized as a potential pathway for attackers. Organizations may also fail to account for outdated permissions, such as not revoking developer access to storage buckets and container pods at the close of a project.

If identities were compromised in either of these scenarios, attackers have an increased chance of escalating privileges or reaching mission-critical data undetected. Enforcing least privilege and continuously validating identities can effectively shrink the attack surface for organizations and lower risk by dissuading malicious insiders and impeding external attackers.

More cloud services, more misconfiguration risks 

We’ve seen incredible innovation from the leading infrastructure-as-a-service (IaaS) platforms as they constantly introduce new services to boost business productivity and develop tools for specialized needs like data streaming, blockchain networking and Internet of Things (IoT) analytics.

While these tools have clear use cases and represent value to the business, it only takes one simple misconfiguration to open the doors for attackers. For example, the 2020 IBM Cost of a Data Breach Report found attackers leveraged cloud misconfigurations in nearly 20% of data breaches.

In a least privilege model, managing permissions to identify potential misconfigurations that result in excessive, unauthorized access to key cloud services is emphasized, which mitigates risk while enabling necessary access to advanced workloads.

Least privilege: recommended by peers

The dangers of over-permissioned identities and the difficulty of securely configuring services in immense cloud environments are top of mind for many security executives. Leading IaaS platforms understand the need to establish strong zero trust models, and all specify least privilege as a security best practice.

Even consortiums like Cloud Security Alliance’s Cloud Controls Matrix stress the importance of continuously reviewing permissions, and highly regulated organizations face financial penalties if they are breached for not establishing least privilege. With these added consequences in mind, organizations must continuously enforce least privilege across their on-premises and cloud workloads to ensure compliance.

The consequences for overlooking identities that are overly permissioned — and thus compromise the zero trust framework — can be high. Once compromised, an attacker could access critical workloads undetected or escalate their privileges to steal cloud-hosted data, disrupt high-value applications or even take entire cloud deployments offline.

Least privilege is recognized as a security best practice for a reason. While it must not come at the expense of end-user productivity or overburden IT teams, effective least privilege enforcement brings the right mix of identity security and privileged access management practices together with flexible controls to balance security and compliance requirements with operational and end-user needs — effectively achieving zero trust.

KEYWORDS: access control authentication security cloud security credentials data breach least privileged access zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Corey Williams is the VP of Marketing for CyberArk.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber network

    The three main ingredients for the successful implementation of Zero Trust in the time of COVID-19: Machine learning, carta and software defined perimeter

    See More
  • cyber security

    5 phases of zero trust in cloud adoption

    See More
  • cloud-computing-freepik56457.jpg

    Securing multi-cloud environments: Why DIY privilege access management doesn’t work

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!