Overview
The Sonrai Cloud Identity Diagnostic is:
- Free: No platform commitment necessary.
- Fast: Results are available in 24 hours.
- Lightweight: Onboard in less than 5 minutes with no installations or agents.
- Built to Share: Stakeholder buy-in is made easy.
How It Works:
The Cloud Identity Diagnostic finds the most common ways an attacker leverages privilege and access to exfiltrate critical assets once they compromise the perimeter. This intel includes: Unsecured privileged admins unknown to IAM/IGA Uncertified machine identities and machine admins Dormant 3rd-party trust relationships Attack paths resulting from self-escalating identities 3rd-party identities with excessive privileges
What You Get:
Patented analytics uncover hidden attack paths to critical assets combined with a strategy of quick remediation steps to maximize reduction today.
With the insight & recommendations from the diagnostic, you can: Reduce the blast radius of privileged identities Decrease attack surface by removing keys and identities no longer in use Simplify cloud audits and reduce stress around compliance Get specific instructions for strategic long-term initiatives and short-term remediations for your cloud
How to Use It:
Achieve a quick win. Run a diagnostic, check out the results, and zero in on one or more of six identity focus areas. Fix the critical risks - on your own or working with an identity expert. Then run another diagnostic, share the results, and celebrate your success. Get ready for an audit. Identify the gaps in your identity security to ensure there are no surprises during the next audit. Work with a partner to dive deeper and fix policy violations mapped to specific frameworks.
Take a strategic approach to red teaming. Use the lateral movement data from the diagnostic to understand what attack paths urgently need locking down, then follow the recommended steps to build a remediation plan.
Highlights
- Analyze the greatest threats to your cloud identities including hidden machine admins, roles with self-escalation capabilities, toxic permission combinations, and dangerous attack paths like assume role chains.
- Get a report on the most important risk remediations to lower cloud identity risk immediately, like certain roles to delete and specific AWS privileges to restrict in specific accounts.
- See how you compare to other clouds in six risk areas - 1) Privileged Identity Distribution 2) Lateral Movement 3) Over-Privileged Identities 4) Trust 5) Unused Identities 6) Access Key Management
Details
Pricing
Custom pricing options
Legal
Content disclaimer
Resources
Vendor resources
Support
Vendor support
All assessments will be conducted with a dedicated Sonrai Security resource. Additional support is available via: