Demystifying Identity and Access Management with John Giglio

Episode No: 71

In this episode of Scale To Zero podcast, John Giglio joins our host Purusottam Mupunu, and discusses a critical component of cloud security "Identity and Access Management".

Discover key considerations for setting up IAM, common vulnerabilities, and best practices for securing remote access and sensitive data. Learn how to balance compliance with effective security, evaluate the right solutions, and promote a security-conscious culture within your organization.

Learnings from the podcast

  1. In an organization, the IAM landscape is always a moving target. So, understand the organizational structure and usability of cloud services before setting up the foundation.
  2. Security vs Compliance is an age-old debate. When the security basics are implemented the right way, compliance automatically follows.
  3. For data perimeter security, use different levels of controls at DLP. Read, Write, and Download data should have different controls. This should be derived from user activity and network logs.

Learning resources recommended by John Giglio

  1. The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win

    A Novel About IT, DevOps, and Helping Your Business Win is a business allegory that uses a fictional company, Parts Unlimited, to explore the challenges of IT departments struggling to meet the needs of the business.

    Link to The Phoenix Project >



  2. Google Security Podcasts

    The Cloud Security Podcast from Google is a weekly news and interview show with insights from the cloud security community.

    Link to Google Security Podcasts >



  3. Azure Friday Podcasts

    Scott Hanselman, Donovan Brown, or Lara Rubbelke host the engineers who build Azure, demo it, answer questions, and share insights.

    Link to Azure Friday Podcasts >

Insights from Cloudanix

Cloudanix and Kapittx case study

Identity and Access Management - The new edge of security

IAM has become increasingly important and industry experts quote it as “The new edge of security.

Cloud compliance checklist - Cloudanix

Checklist for you

A collection of several free checklists for you to use. You can customize, stack rank, backlog these items and share with your other team members.

Go to checklists
Cloudanix Documentation

Cloudanix docs

Cloudanix offers you a single dashboard to secure your workloads. Learn how to setup Cloudanix for your cloud platform from our documents.

Take a look
Monthly changelog

Monthly Changelog

Level up your experience! Dive into our latest features and fixes. Check monthly updates that keep you ahead of the curve.

Take a look
Learn repository

Elevate your Security with IAM Just-In-Time (JIT) Access

Our guide explores IAM Just-In-Time (JIT) Access on AWS: overcoming challenges, ideal workflow & how Cloudanix's solution simplifies it.

Read more