In this episode of ScaletoZero, Join us for an in-depth exploration of IAM, a critical component of cloud security. Discover key considerations for setting up IAM, common vulnerabilities, and best practices for securing remote access and sensitive data. Learn how to balance compliance with effective security, evaluate the right solutions, and promote a security-conscious culture within your organization.
Transcript: https://www.scaletozero.com/episodes/demistifying-identity-and-access-management-with-john-giglio/
What is IAM: https://www.cloudanix.com/learn/what-is-iam
00:00 Teaser and Introduction
05:00 Defining Identity and Access Management.
07:31 Key things to consider before setting your IAM.
09:30 Different ways access permissions may get compromised.
13:30 Other recommendations where security can be enforced.
15:20 Providing access in a remote-first environment.
19:10 Ensuring data security in a remote-first environment.
21:27 Approaching the secure management of secrets and keys in the cloud, considering the shared responsibility model.
25:52 Right time to use custom keys and cloud provider-provided keys.
27:36 Balancing between checkbox compliance and deep security program.
30:35 Evaluating the right security solution.
32:32 Using security baselines to promote security culture within the organization.
35:58 Using threat intelligence to improve the security baselines.
37:56 How can security leaders handle burnout and stress?
45:00 Summary
45:55 Rating Security Practices
Transcript: https://www.scaletozero.com/episodes/demistifying-identity-and-access-management-with-john-giglio/
What is IAM: https://www.cloudanix.com/learn/what-is-iam
00:00 Teaser and Introduction
05:00 Defining Identity and Access Management.
07:31 Key things to consider before setting your IAM.
09:30 Different ways access permissions may get compromised.
13:30 Other recommendations where security can be enforced.
15:20 Providing access in a remote-first environment.
19:10 Ensuring data security in a remote-first environment.
21:27 Approaching the secure management of secrets and keys in the cloud, considering the shared responsibility model.
25:52 Right time to use custom keys and cloud provider-provided keys.
27:36 Balancing between checkbox compliance and deep security program.
30:35 Evaluating the right security solution.
32:32 Using security baselines to promote security culture within the organization.
35:58 Using threat intelligence to improve the security baselines.
37:56 How can security leaders handle burnout and stress?
45:00 Summary
45:55 Rating Security Practices
- Category
- Management
Be the first to comment