
S4 E38 Security wtih LVH (part 4)
ClojureStream Podcast
00:00
Decomplexing Cloud Auditing Services
We look at the inferstructors as the nthe infrstructure as deployed. We have a pile of closure that looks at lbs s, d k descriptions and then it builds this grap of all the dependencies of a vollotes t s operations. So for example, i want to check that all of your e b s volumes are encripted and have certain properties or don't have certain properties. But before you can do r, let's say, snapshots, before you can call e c to describe instance attributes, which is the thing that tells you all the properties about the osi, describe image Attributes. You have to know which image ideas exist, right? That's
Transcript
Play full episode