Blueprint: Build the Best in Cyber Defense cover image

Brandon Evans: Cloud Security - Threats and Opportunities

Blueprint: Build the Best in Cyber Defense

00:00

What Is the Solution to Internal Pivoting in the Cloud?

The attacker was able to impersonate a proxy server and download files from any S3 bucket. The key is identity and access management (IAM), he says. You can layer some network controls on top of that, both to prevent direct access to virtual machines or databases,. As well as IAM conditions that use network rules saying, hey, no one is allowed to access the S3 service for my S3 data unless they're doing it from the VPC.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app