3min chapter

Cloud Security Podcast cover image

CAASM - CyberSecurity Asset Management for the Modern Security Stack

Cloud Security Podcast

CHAPTER

Is There an Owner Identifiable?

When it comes to ownership, we're able to make some inferences. Who has axius and whoever has access could theoretically be the owner. It's a different kind of use case. Less is more proactive. But it's very forward thinking. Can we manage this configuration hygiene through automation and alert on at a low level, medium level? When these tags are missing, maybe tit's interstructure as code. And youd start think about all this stuff that could be in the blast radius of this incident. What dod kennedats, hoxt do, shared s s h keys, you know, all thi stuff. M, it turns into hours of investigation, especially

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode