
CAASM - CyberSecurity Asset Management for the Modern Security Stack
Cloud Security Podcast
00:00
Is There an Owner Identifiable?
When it comes to ownership, we're able to make some inferences. Who has axius and whoever has access could theoretically be the owner. It's a different kind of use case. Less is more proactive. But it's very forward thinking. Can we manage this configuration hygiene through automation and alert on at a low level, medium level? When these tags are missing, maybe tit's interstructure as code. And youd start think about all this stuff that could be in the blast radius of this incident. What dod kennedats, hoxt do, shared s s h keys, you know, all thi stuff. M, it turns into hours of investigation, especially
Transcript
Play full episode