Skip to content

Orphaned cloud resources, typically left over from development or maintenance, represent significant risks of misconfiguration and data breaches. A long-forgotten EC2 instance or VPC may contain OS vulnerabilities or overly permissive security group rules that hackers can use to gain access to your cloud environments.

In this on-demand webinar, watch as Dave Williams, Cloud Architect at New Light Technologies and Josh Stella, Fugue's CTO and Founder as they will:

  • Explain what orphaned cloud resources are and why they are so pervasive
  • Walk through the ways hackers can exploit orphaned resources to breach data
  • Provide practical steps every cloud team can take to eliminate orphaned resources

Practical steps to eliminate orphaned resources

Your privacy is important to us and your information 
will be kept confidential.