Cloud Security Podcast cover image

CAASM - CyberSecurity Asset Management for the Modern Security Stack

Cloud Security Podcast

00:00

Is There an Owner Identifiable?

When it comes to ownership, we're able to make some inferences. Who has axius and whoever has access could theoretically be the owner. It's a different kind of use case. Less is more proactive. But it's very forward thinking. Can we manage this configuration hygiene through automation and alert on at a low level, medium level? When these tags are missing, maybe tit's interstructure as code. And youd start think about all this stuff that could be in the blast radius of this incident. What dod kennedats, hoxt do, shared s s h keys, you know, all thi stuff. M, it turns into hours of investigation, especially

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner
Get the app