Navigating the Identity and Access Management Landscape with Joseph South | Part 1

Episode No: 55

Explore the evolving landscape of IAM, its recent surge in attention, and the double-edged sword of cloud advantages. Learn how organizations tackle IAM challenges, prioritize security configurations, and strike a balance between best practices and SDLC.

Discover why security sometimes takes a back seat and gain valuable insights into the top 5 IAM considerations for matured organizations.

Learnings from the podcast

  1. Security of Cloud IAM requires a different mindset than traditional IAM. Once credentials are breached, attackers gain access to all infrastructure in a Cloud environment. This is one of the primary reasons why IAM is the new perimeter.
  2. To address IAM security gaps, start with tagging of IAM resources, cleanup inactive, roles with over permissions and optimize duplicate permissions.
  3. Security buy-in is key from leaders. This helps security teams enforce security best practices in a collaborative manner.

Learning resources recommended by Joseph South

  1. Security Unfiltered Podcast

    Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over 7 years of experience across several domains of security.

    Security Unfiltered Podcast >



  2. Cloud Control Matrix

    The CSA Cloud Controls Matrix (CCM) is a framework created by the Cloud Security Alliance (CSA) to help organizations assess the security of cloud service providers (CSPs).

    Checkout Cloud Control Matrix >



  3. Countdown to Zero Day by Kim Zetter

    A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.

    Get your copy of Countdown to Zero Day >

Insights from Cloudanix

threat modeling

Identity and Access Management

Learn basics of Identity and Access Management (IAM) in this comprehensive guide. Understand the different IAM concepts, importance, and implementation of it.

threat modeling

Using the Right CIEM

Master Cloud Infrastructure Entitlement Management (CIEM)! Learn what it is, the top 5 benefits, & how to pick the perfect solution for your business.

Cloud compliance checklist - Cloudanix

Checklist for you

A collection of several free checklists for you to use. You can customize, stack rank, backlog these items and share with your other team members.

Go to checklists
Cloudanix Documentation

Cloudanix docs

Cloudanix offers you a single dashboard to secure your workloads. Learn how to setup Cloudanix for your cloud platform from our documents.

Take a look
Monthly changelog

Monthly Changelog

Level up your experience! Dive into our latest features and fixes. Check monthly updates that keep you ahead of the curve.

Take a look
Learn repository

Setting Up Security Boundaries

Master AWS Security: Boundaries, Baselines & Safelisting for Strong Cloud Defense.

Read more