Restorative Justice Framework: A New Way to Solve Conflict

Episode No: 42

Join us as we dive deep into this transformative approach of the Restorative Justice Framework and learn how it can help create more harmonious work for cloud security leaders.

Learnings from the podcast

  1. First Security hire for an organization should be a Generalist and has necessary soft skills to work with other teams to improve overall security. Soft Skills and Relationship building is key at the early stage of an organization.
  2. Security Champions are important for a successful Security program implementation. Collaborate with Engineering and enable them to own the Security Roadmap.
  3. When it comes to Kubernetes, Cloud providers abstract security for the managed pieces. Self hosting is another option but it brings many operational, security challenges with it. Unless absolutely necessary for business reasons, avoid self hosting and use a cloud managed k8s offering.
  4. For Kubernetes security, use of Open Source tooling is a good start. On top of that, follow a threat modeling approach rather than just a checklist approach.

Insights from Cloudanix

threat modeling

Learn Library

List of curated cloud security and cybersecurity topics with detail information for understanding, learning and evolving. Don't miss this!

threat modeling

Using the Right CIEM

Master Cloud Infrastructure Entitlement Management (CIEM)! Learn what it is, the top 5 benefits, & how to pick the perfect solution for your business.

Cloud compliance checklist - Cloudanix

Checklist for you

A collection of several free checklists for you to use. You can customize, stack rank, backlog these items and share with your other team members.

Go to checklists
Cloudanix Documentation

Cloudanix docs

Cloudanix offers you a single dashboard to secure your workloads. Learn how to setup Cloudanix for your cloud platform from our documents.

Take a look
Monthly changelog

Monthly Changelog

Level up your experience! Dive into our latest features and fixes. Check monthly updates that keep you ahead of the curve.

Take a look
Learn repository

Setting Up Security Boundaries

Master AWS Security: Boundaries, Baselines & Safelisting for Strong Cloud Defense.

Read more