Home / Companies / Sysdig / Blog / Post Details
Content Deep Dive

Identity is the Perimeter of the Cloud

Blog post from Sysdig

Post Details
Company
Date Published
Author
Crystal Morin & Steve Riley
Word Count
1,010
Language
English
Hacker News Points
-
Summary

In the evolving landscape of cloud security, identity has become the new perimeter, as evidenced by the growing prevalence of data breaches initiated through compromised credentials, accounting for 93% of such incidents. The dissolution of traditional security perimeters in the cloud era has necessitated a focus on identity security, a priority underscored by Sysdig's partnership with Netskope. This collaboration enhances preventive and reactive identity security capabilities by integrating cross-domain identity management, thereby reducing overly permissive access and improving detection and response times. As attackers increasingly exploit both user and machine identities, the complexity of securing cloud environments has grown, particularly with the proliferation of non-human identities. The Sysdig and Netskope partnership addresses this by providing comprehensive visibility across networks and clouds, leveraging runtime insights to detect and respond to threats in real time. This integration allows organizations to block compromised identities not just within the cloud but across their entire network infrastructure, thereby extending the protective reach of Zero Trust Network Access (ZTNA) policies. Through real-life use cases, the partnership demonstrates how it can quickly identify and mitigate risks associated with stolen credentials, track anomalous behaviors, and enforce automated restrictions to safeguard against potential breaches beyond the cloud.