Identity and Access Management | IAM | Cloud Governance | Ft. John Giglio | S2 Ep.41 | Cloudanix

Описание к видео Identity and Access Management | IAM | Cloud Governance | Ft. John Giglio | S2 Ep.41 | Cloudanix

In this episode of ScaletoZero, Join us for an in-depth exploration of IAM, a critical component of cloud security. Discover key considerations for setting up IAM, common vulnerabilities, and best practices for securing remote access and sensitive data. Learn how to balance compliance with effective security, evaluate the right solutions, and promote a security-conscious culture within your organization.

Transcript: https://www.scaletozero.com/episodes/...
What is IAM: https://www.cloudanix.com/learn/what-...

00:00 Teaser and Introduction
05:00 Defining Identity and Access Management.
07:31 Key things to consider before setting your IAM.
09:30 Different ways access permissions may get compromised.
13:30 Other recommendations where security can be enforced.
15:20 Providing access in a remote-first environment.
19:10 Ensuring data security in a remote-first environment.
21:27 Approaching the secure management of secrets and keys in the cloud, considering the shared responsibility model.
25:52 Right time to use custom keys and cloud provider-provided keys.
27:36 Balancing between checkbox compliance and deep security program.
30:35 Evaluating the right security solution.
32:32 Using security baselines to promote security culture within the organization.
35:58 Using threat intelligence to improve the security baselines.
37:56 How can security leaders handle burnout and stress?
45:00 Summary
45:55 Rating Security Practices

Комментарии

Информация по комментариям в разработке