

Cloud Security Podcast
Cloud Security Podcast Team
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
Episodes
Mentioned books

Jan 30, 2023 • 53min
AWS Cloud Penetration Testing Explained with Example
Cloud Security Podcast - This month we are talking about "Breaking the AWS Cloud" and next up on this series, we spoke to Seth Art (Seth's Linkedin) Cloud Penetration Testing Lead (Principal) at Bishop Fox. AWS cloud project to pentest AWS cloud architecture are not spoken about much - this stops today. We have Seth who works in the Cloud Penetration testing space to talk about open source tools and what Cloud pentesting is all about.
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Seth Art (Seth's Linkedin)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Introduction
(04:24) A bit about Seth
(06:10) Web App Pentesting vs Cloud Pentesting
(08:11) Working with scale of multiple AWS accounts
(10:20) What can you expect to find with Cloud Pentesting?
(12:14) Foundational pieces about approaching pentesting in Cloud
(15:19) How to start a Cloud Pentest?
(18:25) The importance of IAM
(23:43) Common services in AWS to look at
(25:58) Mistakes people make for scoping
(29:18) The role of shared responsibility in Cloud Pentesting
(32:38) Boundaries for AWS pentesting
(35:13) Nmap between 2 EC2 instances
(36:37) How do you explain the findings?
(40:26) Skillsets required to transition to Cloud Pentesting
(45:41) Transitioning from Kubernetes to Cloud Pentesting
(48:55) Resources for learning about Cloud Pentesting.
(49:47) The Fun Section
See you at the next episode!

Jan 24, 2023 • 54min
AWS Goat - Cloud Penetration Testing
Cloud Security Podcast - This month we are talking about "Breaking the AWS Cloud" and next up on this series, we spoke to Nishant Sharma (Nishant's Linkedin), Director, Lab Platform, INE. If you have tried pentesting in AWS Cloud or want to start today with AWS Goat, then this episode with Nishant, behind AWS Goat will help you understand how you can upskill and maybe even show others how to be better at pentesting AWS Cloud.
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Nishant Sharma (Nishant's Linkedin)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Introduction
(03:51) snyk.io/csp
(04:51) What is Cloud Pentesting?
(06:19) Cloud pentesting vs Web App & Network
(08:37) What is AWS Goat?
(13:12) Do you need permission from AWS to do pentesting?
(14:03) Pentesting an application vs pentesting AWS S3
(15:40) What is AWS Goat testing?
(18:14) Cloud penetration testing tools
(19:59) How useful is a metadata of a cloud instance?
(22:24) AWS Pentesting and OWASP Top 10
(25:31) How to build internal training for Cloud Security?
(29:43) Keep building knowledge on AWS Goat
(30:33) Using CloudShell for AWS pentesting
(34:09) ChatGPT for cloud pentesting
(36:28) Vulnerable serverless application
(39:40) Pentesting Amazon ECS
(43:01) How do you protect against ECS misconfigurations?
(47:38) What is the future plan for AWS Goat?
(50:28) Fun Questions
See you at the next episode!

Jan 12, 2023 • 33min
Getting Started with Hacking AWS ECS
Cloud Security Podcast - This month we are talking about "Breaking the AWS Cloud" and next up on this series, we spoke to Gafnit Amiga (Gafnit's Linkedin), VP of Security Research at Lightspin who recently discovered the AWS Elastic Container Registry Public (ECR Public) vulnerability. She spoke to us about how she goes about doing cloud security research and what AWS ECS and ECR is.
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Gafnit Amiga (Gafnit's Linkedin)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Introduction
(02:28) snyk.io/csp
(02:57) A bit about Gafnit
(05:15) What is AWS ECS and ECR?
(08:18) Why do people use ECS and ECR?
(09:58) The ECR vulnerability Gafnit discovered
(15:16) Vulnerability scanning for containers in AWS ECR
(16:42) How do you find undocumented APIs in AWS?
(17:58) Attack techniques in AWS
(22:43) How to protect your AWS accounts?
(25:14) Focus areas for Cloud Security Research in 2023
(25:48) Finding vulnerability through research
(29:00) Resources for Cloud Security Research
(31:04) The Fun Section
See you at the next episode!

Jan 8, 2023 • 46min
GETTING STARTED WITH HACKING AWS CLOUD
Cloud Security Podcast - If Hacking the Cloud is on your mind for 2023 then in this "Breaking the AWS Cloud" month we are kicking things with Nick Frichette (Nick's Linkedin), a Senior Security Researcher from DataDog who is also maintains the site Hacking the Cloud linking offensive security research for AWS, Azure, GCP.
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Nick Frichette (Nick's Linkedin)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Introduction
(02:38) snyk.io/csp
(03:26) A bit about Nick
(04:15) How is Security research different?
(05:55) How to approach cloud security research?
(07:24) How to pick the service you want to research?
(08:51) What is AWS AppSync?
(09:30) What is Confused Deputy Vulnerability?
(10:16) The AppSync Vulnerability
(12:09) Cross Account in AWS
(13:41) Blue Teaming Controls when doing research
(14:22) Framework for detective controls
(16:01) What to do if you find an AWS vulnerability?
(17:20) Legal constraints of security research
(20:13) Where to get started in Cloud Security Research?
(22:45) Are some misconfigurations becoming less common?
(24:59) What is IMDSv2 and how is it different to IMDSv1?
(27:00) Why is SSRF bad?
(28:52) Cloud Pentesting Platforms
(29:57) The story being hacking the cloud
(31:25) Who should think about breaking the cloud?
(34:02) Cloud Security Research Tools
(36:38) How to access AWS environment for research?
(39:12) Security Lab Resources
(40:04) The Fun Questions
See you at the next episode!

Dec 14, 2022 • 43min
AWS Reinvent 2022 - RECAP for Cloud Security Professionals!
In this episode of the Virtual Coffee with Ashish edition, we spoke with Shilpi Bhattacharjee (Cloud Security Podcast, Producer). We spoke about Announcements from AWS Reinvent for - new security products announced, updates to existing security products, security addition to existing products and products to lookout for.
Podcast Link with favourite Talks, Product launch details and more: https://snyk.io/blog/cloud-security-updates-reinvent-2022/
--Announcing Cloud Security Villains Project--
We are always looking to find creative ways to educate folks in Cloud Security and the Cloud Security Villains is part of this education pieces. Cloud Security Villains are coming, you can learn how to defeat them in this YouTube Playlist link
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Shilpi Bhattacharjee (Cloud Security Podcast, Producer)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions

4 snips
Dec 10, 2022 • 58min
AWS EKS EXPLAINED!
In this episode of the Virtual Coffee with Ashish edition, we spoke with Justin Garrison (Personal Website) from AWS to talk about what scenarios make sense to choose AWS EKS vs AWS ECS vs AWS Fargate vs bare metal Kubernetes & everything you need to understand for implementing AWS EKS in your environment.
--Announcing Cloud Security Villains Project--
We are always looking to find creative ways to educate folks in Cloud Security and the Cloud Security Villains is part of this education pieces. Cloud Security Villains are coming, you can learn how to defeat them in this YouTube Playlist link
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Justin Garrison (Personal Website)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00 introduction
(02:31 snyk.io/csp
(03:10 Justin's path into Tech
(08:14) What is AWS EKS?
(10:32) EKS vs ECS vs Fargate
(14:52) Why pick EKS vs ECS vs Fargate?
(23:05) Security Kubernetes API vs on-prem deployment?
(34:26) What's involved in deploying EKS?
(38:50) EKS clusters when scaling Kubernetes
(42:52) How clusters are structured?
(47:02) Cluster availability when upgrading
(49:00) Why people struggle with EKS?
(51:31) How can people learn more about EKS?
(52:57) The Fun Section

Nov 25, 2022 • 54min
Story of a Cloud Architect & Blurry Lines of Control with AWS
In this episode of the Virtual Coffee with Ashish edition, we spoke with Ashish Desai (Ashish Desai's Linkedin) about how much of the on-premise can work in Cloud, what the online world is saying versus the reality of what businesses are experiencing.
--Announcing Cloud Security Villains Project--
We are always looking to find creative ways to educate folks in Cloud Security and the Cloud Security Villains is part of this education pieces. Cloud Security Villains are coming, you can learn how to defeat them in this YouTube Playlist link
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Ashish Desai (@ashishlogmaster)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Intro
(05:50) Ashish Desai's Professional Background
(06:21) Academic Freedom and no firewall
(07:12) What are the roles and responsibilities of an AWS cloud security architect?
(09:27) Difference between managing permissions between onpremise vs Cloud service provider
(13:02) Running Windows 2003 on AWS EC2 Bare Metal
(13:28) Running Old Virtual Servers on AWS
(14:13) Cloud is secure by default
(14:54) CI/CD with Github and Terraform is not common
(15:28) Do people use CI/CD?
(15:37) Traditional on-premise staff is your new cloud engineer
(16:50) Business are not fully advanced
(17:47) Failed Kubernetes Deployment in production example
(18:45) Managed and Bare Metal Kubernetes can only maintain 1 replica
(19:10) What is 1 replica in Kubernetes?
(20:36) Problem with stateful app running on Kubernetes
(21:35) Change Management in Cloud
(21:57) Deployment phases in Cloud
(22:34) Why was ServiceNow required?
(24:39) Why ServiceNow couldn't keep up?
(26:33) Native Solutions bypass Change Management
(28:43) Role of Security Architect in a New Cloud World
(29:53) DevExperience is holding Cloud Adoption success
(32:08) CyberProfessionals to know atleast 1 language to be succesful
(32:27) Do Architect need to know how to code in Enterprise context?
(33:24) Knowing Code to understand the lay of the land
(35:22) Has the Architecture Frameworks changed in the Cloud world?
(37:15) What other skillsets outside of coding is required to be successful in Cloud
(39:54) Should we care about being Cloud agnostic?
(40:41) Architecture for Operational side of Cloud Security?
(43:51) Practical things for advancing Cloud skills?
(48:36) Can anyone come out of uni and become a Cloud Security Architect
(50:32) Resources for education on Cloud security architects
(51:36) Fun Section

Nov 13, 2022 • 54min
BECOME A CLOUD SECURITY ARCHITECT IN 2023
In this episode of the Virtual Coffee with Ashish edition, we spoke with Kat Traxler (Kat's Linkedin) about the skillset, certification and knowledge base required to become a cloud security architect in 2023.
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Kat Traxler (Kat's Linkedin)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Ashish's Intro to the Episode
(02:28) https://snyk.io/csp
(02:46) A bit about Kat
(05:35) What does a security architect do?
(06:46 )The difference in the Cloud Security Architect role
(11:08) The building blocks of building an application in AWS
(13:41) Are there DMZs in Cloud Architecture?
(15:54) Cybercriminal and Cloud exploitation
(19:04) How to keep with rapid changes in cloud?
(20:08) AWS pre:invent update
(21:39) Why is IAM important in Cloud?
(25:03) Do cloud security architects need to know coding and automation?
(27:38) How important are certifications?
(31:49) Getting in cloud security with no experience
(33:41) What are important skills for architect?
(35:33) SANS certifications for Cloud Security Architects
(37:04) How important is ist to have multi cloud knowledge
(40:44) Frameworks to build cloud architecture
(42:59) Do you need to know software development?
(44:19) Roadmap to become a cloud security architect
(45:32) What is the most difficult thing related to architecture?
(49:32) The Fun Section

Nov 10, 2022 • 47min
AWS Threat Detection for NOT SO COMMON AWS Services Explained
In this episode of the Virtual Coffee with Ashish edition, we spoke with Rodrigo Montoro (Rodrigo's linkedin) about threat modelling and incident response involving the uncommon AWS services which still may be widely used in your organisation and increase your attack surface.
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Rodrigo Montoro (Rodrigo's linkedin)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Ashish's Intro to the Episode
(02:10) https://snyk.io/csp
(03:19) A bit about Rodrigo
(04:37) Detection in On-Premise
(06:51) The role of API in Cloud
(08:06) Common Services in AWS
(15:22) Managing unused services
(17:38) Incident response for AWS Appstream ?
(20:57) integration of services with Cloudtrail
(27:14) AWS Pass role
(31:38) Incident Response for services
(34:00) Pre-signed URL
(36:23) How to get started in AWS threat detection?
(39:10) Where can people learn more about this?
(41:37) How to do AWS threat detection at Scale?
(43:30) The Fun Section

Nov 6, 2022 • 38min
Ransomware attacks in AWS
In this episode of the Virtual Coffee with Ashish edition, we spoke with Nandesh Guru (Nandesh's Linkedin) about ransomware and supply chain attack mechanisms in AWS and how the world of CSPM have evolved to address the increasing complexities of cloud security
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Nandesh Guru (Nandesh's Linkedin)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Ashish's Intro to the Episode
(02:09) https://snyk.io/csp
(03:11 )A bit about Nandesh
(05:01) 4 Components of Supply Chain Risks
(06:47)Example of AWS Supply Chain Attack
(10:08) Evaluating code scanning tools
(12:30) What is ransomware?
(13:06) Ransomware in AWS
(14:55) Attacks on encryption in AWS
(19:27) What is a CSPM?
(20:46) The role of CSPM and CNAPP in supply chain attacks
(22:56) Is CIS Benchmark still a good starting point?
(26:38) The evolution of CSPMs
(29:47) Complexity of Cloud Security
(32:59)Where can you learn more about supply chain risks?
(33:50) Fun Questions


