2min snip

Cloud Unfiltered cover image

Ep105: Managing Non-human Identities in the Cloud, with Eric Kedrosky

Cloud Unfiltered

NOTE

Mapping Effective Permissions and Monitoring for Security in the Cloud

Effective permissions are mapped end to end, providing a picture of what someone can do/nRoles may grant users the ability to perform actions they are not aware of due to over permission/nActivity is mapped and monitored to track user actions and identify potential security breaches/nAllowing overly permissive identities is a common mistake when managing non people identities in the cloud/nManaging security environments in the cloud can be complex, especially when working across multiple clouds/nQuickly putting together a solution can result in broken systems and potential business impact/nMeeting delivery dates may be at risk when security configurations are not properly managed

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode