multicloud365
  • Home
  • Cloud Architecture
    • OCI
    • GCP
    • Azure
    • AWS
    • IAC
    • Cloud Networking
    • Cloud Trends and Innovations
    • Cloud Security
    • Cloud Platforms
  • Data Management
  • DevOps and Automation
    • Tutorials and How-Tos
  • Case Studies and Industry Insights
    • AI and Machine Learning in the Cloud
No Result
View All Result
  • Home
  • Cloud Architecture
    • OCI
    • GCP
    • Azure
    • AWS
    • IAC
    • Cloud Networking
    • Cloud Trends and Innovations
    • Cloud Security
    • Cloud Platforms
  • Data Management
  • DevOps and Automation
    • Tutorials and How-Tos
  • Case Studies and Industry Insights
    • AI and Machine Learning in the Cloud
No Result
View All Result
multicloud365
No Result
View All Result

A Smarter Different to Entra Permissions Administration

admin by admin
April 28, 2025
in Cloud Security
0
A Smarter Different to Entra Permissions Administration
399
SHARES
2.3k
VIEWS
Share on FacebookShare on Twitter


Microsoft has introduced the retirement of Entra Permissions Administration (previously CloudKnox), with gross sales ending June 30, 2025.

EPM provided precious visibility into cloud permissions, serving to groups determine overprivileged identities throughout AWS, Azure, and GCP. However for a lot of organizations, that visibility got here with vital handbook overhead: Coverage rewrites, change home windows, and time-consuming investigations.

As EPM sunsets, Microsoft has named Delinea as a transition associate. Delinea gives a Privileged Entry Administration (PAM) strategy targeted on credential vaulting and session management. However for groups managing complicated, fast-moving cloud environments, the necessity goes past controlling credentials. The true problem is managing permissions and doing it repeatedly, with out slowing down the enterprise.

Why Visibility Alone Isn’t Sufficient

EPM was designed to assist organizations uncover permissions danger, however not implement controls. Even with visibility, many groups have been left to:

  • Manually analyze entry patterns
  • Construct and check customized IAM insurance policies
  • Remediate danger with out breaking workloads

In cloud environments the place identification modifications continuously — throughout accounts, providers, and exterior integrations — handbook workflows don’t scale, and visibility with out motion leaves gaps.

The Alternative: Transfer From Monitoring to Enforcement

The retirement of EPM is an opportunity to rethink your cloud identification technique. As an alternative of changing one visibility software with one other, organizations can transfer towards options that automate entry management and repeatedly cut back identification danger.

Fashionable cloud safety requires:

  • Imposing least privilege throughout human and machine identities
  • Integrating with developer workflows and approval instruments
  • Adapting in actual time as cloud environments evolve
  • Managing third-party entry with out exceptions or handbook workarounds
  • Avoiding friction that slows down engineering groups

Sonrai’s Cloud Permissions Firewall: Constructed for Fashionable Cloud Identification Danger

The Cloud Permissions Firewall from Sonrai Safety is designed to satisfy at present’s cloud entry challenges head-on. Fairly than counting on dashboards and handbook cleanup, the Firewall permits organizations to take management of identification danger and dramatically cut back it with automation.

Automated Least Privilege

The Firewall repeatedly analyzes exercise and removes unused permissions primarily based on actual utilization knowledge. A single world coverage enforces least privilege throughout your atmosphere with out customized coverage engineering.

Zero Disruption to DevOps

Entry that’s getting used stays in place. Builders and workloads aren’t interrupted. If entry is required, the Firewall routes the request via Slack, Groups, or Electronic mail for approval and mechanically updates permissions.

Built-in Simply-in-Time Entry

Entry is granted solely when it’s wanted, managed by cloud-native insurance policies and authorised via chat instruments like Slack or Groups. This minimizes standing privilege whereas delivering quick, auditable entry aligned with enterprise intent.

No Soar Packing containers

Sonrai doesn’t proxy periods or insert new instruments into the workflow. Customers proceed to entry sources via native cloud consoles, CLIs, and APIs.

Third-Get together Entry, Totally Managed

With CPF, organizations achieve full visibility and management over exterior identities — distributors, contractors, and companions. You’ll be able to implement least privilege for third-party accounts, monitor their exercise, and mechanically revoke unused entry on a steady foundation.

A Shift from Vaults to Coverage

PAM instruments like Delinea play an essential position in managing credentials. However at present’s cloud identification danger stems from permissions, not simply secrets and techniques. Least privilege isn’t about managing passwords. It’s about managing what identities can do in your atmosphere.

Cloud Permissions Firewall addresses the actual root of cloud identification danger:

  • Advanced inheritance
  • Unused and overbroad permissions
  • Exterior entry pathways
  • Misaligned insurance policies that persist over time

Don’t Substitute EPM. Rethink the Downside.

The tip of Entra Permissions Administration presents greater than a tooling resolution. It’s an opportunity to make significant progress in cloud identification safety.

Sonrai’s Cloud Permissions Firewall helps safety groups transfer past monitoring to enforcement. It’s a purpose-built resolution for organizations that wish to cut back danger, obtain least privilege quicker, and preserve management as their cloud environments develop.

secure sensitive permissionssecure sensitive permissions

Tags: AlternativeEntraManagementPermissionsSmarter
Previous Post

Misplaced in Translation? 5 UK/US Tradition Hole Classes

Next Post

Mastering the Tshark Command Line: A Complete How-To Information

Next Post
Mastering the Tshark Command Line: A Complete How-To Information

Mastering the Tshark Command Line: A Complete How-To Information

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending

Alooma vs Fivetran vs Hevo: A Complete Evaluation

Alooma vs Fivetran vs Hevo: A Complete Evaluation

May 4, 2025
Prime 7 Prefabricated Toilet Pod Producers

Prime 7 Prefabricated Toilet Pod Producers

April 17, 2025
Introduced at Construct 2025: Foundry connection for Azure Cosmos DB, World Secondary Index, full-text search, and extra

Introduced at Construct 2025: Foundry connection for Azure Cosmos DB, World Secondary Index, full-text search, and extra

May 21, 2025
The partnership that may forestall vape gross sales to minors

The partnership that may forestall vape gross sales to minors

January 29, 2025
Personal Cloud vs Public Cloud

Personal Cloud vs Public Cloud

January 27, 2025
Pmap Command In Linux – Database Tutorials

Pmap Command In Linux – Database Tutorials

March 24, 2025

MultiCloud365

Welcome to MultiCloud365 — your go-to resource for all things cloud! Our mission is to empower IT professionals, developers, and businesses with the knowledge and tools to navigate the ever-evolving landscape of cloud technology.

Category

  • AI and Machine Learning in the Cloud
  • AWS
  • Azure
  • Case Studies and Industry Insights
  • Cloud Architecture
  • Cloud Networking
  • Cloud Platforms
  • Cloud Security
  • Cloud Trends and Innovations
  • Data Management
  • DevOps and Automation
  • GCP
  • IAC
  • OCI

Recent News

PowerAutomate to GITLab Pipelines | Tech Wizard

PowerAutomate to GITLab Pipelines | Tech Wizard

June 13, 2025
Runtime is the actual protection, not simply posture

Runtime is the actual protection, not simply posture

June 13, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact

© 2025- https://multicloud365.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Cloud Architecture
    • OCI
    • GCP
    • Azure
    • AWS
    • IAC
    • Cloud Networking
    • Cloud Trends and Innovations
    • Cloud Security
    • Cloud Platforms
  • Data Management
  • DevOps and Automation
    • Tutorials and How-Tos
  • Case Studies and Industry Insights
    • AI and Machine Learning in the Cloud

© 2025- https://multicloud365.com/ - All Rights Reserved