
Ep105: Managing Non-human Identities in the Cloud, with Eric Kedrosky
Cloud Unfiltered
00:00
Mapping Effective Permissions and Monitoring for Security in the Cloud
Effective permissions are mapped end to end, providing a picture of what someone can do/nRoles may grant users the ability to perform actions they are not aware of due to over permission/nActivity is mapped and monitored to track user actions and identify potential security breaches/nAllowing overly permissive identities is a common mistake when managing non people identities in the cloud/nManaging security environments in the cloud can be complex, especially when working across multiple clouds/nQuickly putting together a solution can result in broken systems and potential business impact/nMeeting delivery dates may be at risk when security configurations are not properly managed
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.