Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13
Introduction
00:00 • 4min
How to Define a Data Perimeter in AWS
03:39 • 2min
How to Make a Data Perimeter for Your Organization
05:25 • 2min
AWS Data Periphery: How to Create a Zone of Distrust Outside of Your Organization
07:00 • 2min
The Positive Spin of the AWS Data Perimeter
08:40 • 2min
How to Implement a Data Perimeter in AWS
11:05 • 2min
The Importance of Data Perimeter in AWS
12:42 • 2min
The Importance of Service Control Policies in AWS
14:40 • 2min
How to Prevent Credential Attacks With IMDS V2
16:23 • 2min
The Pros and Cons of AWS Data Perimeter
17:53 • 2min
The Challenges of Implementing a Data Perimeter
20:13 • 2min
How to Build a Data Perimeter
22:17 • 2min
How I Learned to Origami Without Formal Training and Security
23:51 • 3min