The research delves into the pressing issue of securing organizational data, particularly in light of the limitations of existing enterprise tools. It introduces two approaches for enhancing data security and preventing breaches, with a focus on Identity Governance & Administration (IGA) tools. Unlike traditional IGA tools, which mainly concentrate on access provisioning and compliance, the proposed solution prioritizes early privilege escalation detection and proactive breach prevention. It employs a flexible YAML DSL for customization, addressing common issues such as limited support for custom applications and protocol dependencies. The research emphasizes continuous scanning for Personally Identifiable Information (PII) data and explores cost-effective methods and best practices. The innovative approach aims to grant users complete control over their security findings, with versatility across various assets and applications, including major cloud providers. The tools discussed in the research are hawk-eye (completely open-source) and Xposed for finding Privilege Escalations, with plans to make the latter open-source soon.
Rohit Kumar serves as a Product Security Engineer at Groww, India, where his primary focus is on enhancing cybersecurity measures. Beyond his role, he harbors a keen passion for developing tools to bolster cybersecurity, and his contributions to open-source projects have found widespread use across companies in India, Europe, and the USA. He also maintains multiple open-source projects like Hawk-eye a PII & Secret scanner for your entire Infra, and Hela Scanner for source code security at CI/CD level. He has shared his insights and practical experience at conferences like Blackhat MEA, SecTor, and Europe. As a distinguished Security Researcher, Rohit has held a top position in the Facebook Bug Bounty program for the last four years. He has actively participated in multiple private live hacking events conducted by Facebook, showcasing his hands-on expertise. Rohit's specialization lies in source code security, product development.