Explore the evolving landscape of IAM, its recent surge in attention, and the double-edged sword of cloud advantages. Learn how organizations tackle IAM challenges, prioritize security configurations, and strike a balance between best practices and SDLC.
Discover why security sometimes takes a back seat and gain valuable insights into the top 5 IAM considerations for matured organizations.
You can read the complete transcript of the epiosde here >
Learnings from the podcast
- Security of Cloud IAM requires a different mindset than traditional IAM. Once credentials are breached, attackers gain access to all infrastructure in a Cloud environment. This is one of the primary reasons why IAM is the new perimeter.
- To address IAM security gaps, start with tagging of IAM resources, cleanup inactive, roles with over permissions and optimize duplicate permissions.
- Security buy-in is key from leaders. This helps security teams enforce security best practices in a collaborative manner.
Learning resources recommended by Joseph South
-
Security Unfiltered Podcast
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over 7 years of experience across several domains of security.
-
Cloud Control Matrix
The CSA Cloud Controls Matrix (CCM) is a framework created by the Cloud Security Alliance (CSA) to help organizations assess the security of cloud service providers (CSPs).
Checkout Cloud Control Matrix >
-
Countdown to Zero Day by Kim Zetter
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.