Cloud Unfiltered cover image

Ep105: Managing Non-human Identities in the Cloud, with Eric Kedrosky

Cloud Unfiltered

NOTE

Mapping Effective Permissions and Monitoring for Security in the Cloud

Effective permissions are mapped end to end, providing a picture of what someone can do/nRoles may grant users the ability to perform actions they are not aware of due to over permission/nActivity is mapped and monitored to track user actions and identify potential security breaches/nAllowing overly permissive identities is a common mistake when managing non people identities in the cloud/nManaging security environments in the cloud can be complex, especially when working across multiple clouds/nQuickly putting together a solution can result in broken systems and potential business impact/nMeeting delivery dates may be at risk when security configurations are not properly managed

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner