The podcast discusses the importance of email security and highlights the significance of AWS role session tags for GitHub Actions. It also explores the damning summary of the Okta hack and introduces the AWS Digital Sovereignty Pledge for an independent sovereign cloud in Europe.
Using AWS role session tags for GitHub Actions can be helpful, but the dependency on Cognito is a drawback that needs alternative solutions.
Octa's handling of a recent hack, delaying action despite warnings, calls for caution when using their services.
Deep dives
Use of AWS Role Session Tags for JITHAUB actions
The podcast episode discusses the use of AWS role session tags for JITHAUB actions. While this approach is considered helpful, the episode criticizes the dependency on Cognito to implement it. The speaker notes that Cognito is often regarded as a problematic service, as evident from critical comments on Twitter. This highlights the need for alternative solutions for implementing AWS role session tags.
Octa's Response to the Hack and AWS Digital Sovereignty Pledge
The podcast episode critiques Octa's handling of a recent hack. Despite being notified by Beyond Trust weeks in advance, Octa took action only after a warning from Cloudflare, which mirrors their previous breach incident. Due to this, the speaker advises caution when using Octa. Additionally, AWS announced the AWS Digital Sovereignty Pledge, revealing plans for an independent sovereign cloud in Europe. However, some concerns arise with the potential transfer of billing metadata out of the EU regions, and details regarding pricing, timeline, and eligibility for workloads remain undisclosed.
1.
Importance of Email Security and AWS Announcements
Last week in security news: Using AWS role session tags for GitHub Actions, A summary of the Okta hack is pretty damning, IAM Roles Anywhere with an external certificate authority, and more!