Blueprint: Build the Best in Cyber Defense cover image

Brandon Evans: Cloud Security - Threats and Opportunities

Blueprint: Build the Best in Cyber Defense

00:00

What Are the Most Common Attacks on the Cloud?

The most common attacks or signs of compromise in the cloud are starting up new services and VMs that were unexpected. The creation case is hopefully getting much more rare because people generally speaking, I think, are getting good at selecting the policy that says read only instead of full access. You're looking for anomalies of kind of, you know, against normal, right? And looking for like one account, maybe reading all your S3 files and it's never done that before or something,. Yeah. Awesome. So I played around with containers for a little bit and kind of skipped that generation into serverless because for my use cases, serverless is so easy to get things up and running.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app