Poor identity and access management hygiene is a top cause of intentional and accidental exposures in public cloud environments. Threat actors are constantly looking for ways to exploit IAM misconfigurations such as overly permissive identities, poor password and credential practices, and accidental public exposure.
Orca detects and prioritizes identity and access management misconfigurations such as weak and leaked passwords, exposed credentials, and overly permissive identities. Continuous IAM monitoring across your cloud estate prevents malicious and accidental exposure.
Orca employs multiple methods to identify poor password hygiene, including commonly used passwords, complex passwords that are reused across multiple applications and services, and highly secure passwords that have been leaked.
Orca scans your entire cloud estate for exposed keys, passwords in shell history, vulnerabilities, and other information that an attacker can leverage to move laterally in your environment.
North America
Insurance
AWS, GCP, Azure
“Orca has helped reduce my audit effort; for example, I can run reports that show we maintain least privilege controls and that we use multi-factor authentication.”
Jonathan JaffeCISO
Lemonade