Orphaned cloud resources, typically left over from development or maintenance, represent significant risks of misconfiguration and data breaches. A long-forgotten EC2 instance or VPC may contain OS vulnerabilities or overly permissive security group rules that hackers can use to gain access to your cloud environments.
In this on-demand webinar, watch as Dave Williams, Cloud Architect at New Light Technologies and Josh Stella, Fugue's CTO and Founder as they will:
- Explain what orphaned cloud resources are and why they are so pervasive
- Walk through the ways hackers can exploit orphaned resources to breach data
- Provide practical steps every cloud team can take to eliminate orphaned resources