<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cloud Security Setup Guides on SolCyber Knowledgebase</title><link>https://kb.solcyber.com/cloud-security-setup-guides/</link><description>Recent content in Cloud Security Setup Guides on SolCyber Knowledgebase</description><generator>Hugo</generator><language>en</language><atom:link href="https://kb.solcyber.com/cloud-security-setup-guides/index.xml" rel="self" type="application/rss+xml"/><item><title>AWS Cloud Security Configuration</title><link>https://kb.solcyber.com/cloud-security-setup-guides/aws-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/cloud-security-setup-guides/aws-configuration/</guid><description>&lt;p&gt;According to Gartner, the #1 threat to cloud infrastructure is &lt;strong&gt;entitlements and permissions.&lt;/strong&gt; Identifying risky permissions and misconfigurations is difficult. SolCyber partners with Ermetic Security to monitor customer&amp;rsquo;s cloud security posture. Ermetic enables you to address the #1 risk to your cloud infrastructure – identities – by detecting and prioritizing risky entitlements and misconfigurations at scale. Ermetic allows SolCyber to continuously discover a customer&amp;rsquo;s cloud asset inventory and applies full-stack analytics to identify risk accurately and in context. SolCyber can help customers manage access permissions, ensure cloud compliance and shift left on least privilege, thereby reducing cloud attack surface.&lt;/p&gt;</description></item><item><title>Azure Cloud Security Configuration</title><link>https://kb.solcyber.com/cloud-security-setup-guides/azure-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/cloud-security-setup-guides/azure-configuration/</guid><description>&lt;p&gt;According to Gartner, the #1 threat to cloud infrastructure is &lt;strong&gt;entitlements and permissions.&lt;/strong&gt; Identifying risky permissions and misconfigurations is difficult. SolCyber partners with Ermetic Security to monitor customer&amp;rsquo;s cloud security posture. Ermetic enables you to address the #1 risk to your cloud infrastructure – identities – by detecting and prioritizing risky entitlements and misconfigurations at scale. Ermetic allows SolCyber to continuously discover a customer&amp;rsquo;s cloud asset inventory and applies full-stack analytics to identify risk accurately and in context. SolCyber can help customers manage access permissions, ensure cloud compliance and shift left on least privilege, thereby reducing cloud attack surface.&lt;/p&gt;</description></item><item><title>Single Sign On Configuration</title><link>https://kb.solcyber.com/cloud-security-setup-guides/single-sign-on-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/cloud-security-setup-guides/single-sign-on-configuration/</guid><description>&lt;h2 id="azure-active-directory-saml"&gt;&lt;strong&gt;Azure Active Directory (SAML)&lt;/strong&gt;&lt;a class="anchor" href="#azure-active-directory-saml"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In the Azure portal, navigate to &lt;strong&gt;Enterprise applications&lt;/strong&gt;, and then add a &lt;strong&gt;New application&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Create your own application&lt;/strong&gt;, and then enter a name for the app.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select the default value of &lt;strong&gt;Integrate any other application you don’t find in the gallery (Non-Gallery)&lt;/strong&gt; and then click &lt;strong&gt;Create&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On the app Overview page that displays, in the &lt;em&gt;Set up single sign on&lt;/em&gt; step, click &lt;strong&gt;Get started&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Choose &lt;strong&gt;SAML&lt;/strong&gt; as the SSO method.&lt;/p&gt;</description></item></channel></rss>