Skip to main content

Concepts

info

The English user guide is currently in beta preview. Most of the documents have been automatically translated from the Japanese version. Should you find any inaccuracies, please reach out to Flatt Security.

This document introduces the concepts behind Shisho Cloud's Cloud Infrastructure Entitlement Management (CIEM) feature. It specifically details the following:

  • What you can achieve with Shisho Cloud's CIEM feature
  • Key features of Shisho Cloud's CIEM functionality

What You Can Achieve with Shisho Cloud's CIEM Feature

Understand How Permissions Are Granted

Strict permission management based on the Principle of Least Privilege (PoLP) is essential for securing your cloud environment. CIEM (Cloud Infrastructure Entitlement Management) aims to centrally monitor and control identities and access permissions in cloud environments to reduce the risk of unauthorized access and information leakage.

Shisho Cloud's CIEM feature provides detailed and clear visualization of permissions assigned to IAM users, roles, and groups. This helps you identify and correct potential excessive permissions and misconfigurations early, supporting safe and appropriate cloud operations.

Determine if Policies Assigned to Entities (Cloud Resources) Are Appropriate

Properly managing policies assigned to each entity (cloud resource) is important. Excessive permissions or misconfigurations can lead to serious threats such as resource destruction or information leakage. Therefore, it's necessary to continuously verify whether each policy meets the principle of least privilege.

Shisho Cloud's CIEM feature automatically evaluates policies assigned to resources and visualizes any detected risks to notify customers. This helps you understand potential risks early and supports the prompt implementation of appropriate corrective measures.

Key Features of Shisho Cloud's CIEM Feature

Comprehensive Identity Visualization

The CIEM feature visualizes permissions granted to all IAM entities in your cloud environment:

  • Users: Human and service accounts with direct or inherited permissions
  • Roles: IAM roles that can be assumed by users, services, or external entities
  • Groups: Collections of users with shared permissions

Cross-Account Relationship Visualization

The CIEM feature identifies and lists accounts (cross-accounts) and entities that can access resources across account boundaries.

You can also export information about entity and cross-account relationships as CSV.

Enumeration of Entities with Risks

The CIEM feature lists entities with risky policies in four levels, along with detailed information:

Risk LevelDescription
CriticalEntities with administrative privileges or equivalent, or with dangerous permission combinations
HighEntities with high-risk permissions or extensive cross-account access
MediumEntities with relatively sensitive permissions or limited cross-account access
LowEntities with relatively low-risk permissions with limited scope