Orphaned cloud resources, typically left over from development or maintenance, represent significant risks of misconfiguration and data breaches. A long-forgotten EC2 instance or VPC may contain OS vulnerabilities or overly permissive security group rules that hackers can use to gain access to your cloud environments.
In this on-demand webinar, watch as Dave Williams, Cloud Architect at New Light Technologies and Josh Stella, Fugue's CTO and Founder as they will:
I’m seeing a lot of cloud configuration errors in the real world —and it’s scaring the hell out of me.
David Linthicum Chief Cloud Strategy Officer, Deloitte Consulting