4.6 • 1K Ratings
🗓️ 30 January 2022
⏱️ 34 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire X a series of specials where we highlight important security topics affecting security professionals worldwide. |
0:28.0 | I'm Rick Howard, the chief security officer, chief analyst, and senior fellow at the CyberWire, and today's episode is titled |
0:35.6 | Zero Trust for Cloud Assets, Identity Authentication, and Authorization. |
0:41.0 | Applying Zero Trust Principles to access rights can be tricky. |
0:45.0 | Amazon's Lambda functions, Google's Cloud Functions, and Microsoft's Azure Functions |
0:50.0 | multiply the volume of identities to manage. |
0:52.0 | These cloud services often have excessive multiply the volume of identities to manage. |
0:52.6 | These cloud services often have excessive permissions to access sensitive data |
0:57.0 | and can become a potential entry point for an attacker. |
1:00.4 | In today's show, we will consider the pros and cons of different approaches to |
1:04.2 | enforcing least privileges in the cloud. A program note, each CyberWire X special |
1:09.3 | features two segments. In the first part of the show we will hear from industry experts on the topic at hand. |
1:15.0 | And in the second part we will hear from our show's sponsor for their point of view. |
1:19.0 | Here's a word from today's sponsor, SistIG. SISIG. |
1:25.0 | SISIG is driving the secure Devops movement, providing visibility and security, to confidently run containers, |
1:34.8 | Kubernetes, and the cloud. Modern cloud apps are built using continuous |
1:39.3 | integration slash continuous deployment or CICD for short and run as containerized micro services. |
1:47.2 | This generational ship creates opportunity to get security right by embedding policy into Dev-ops workflows. |
1:54.4 | Legacy tools can't see inside containers and slow application delivery. |
1:59.4 | What's needed is a container and a cloud security stack built on open source innovation |
2:05.8 | with deep and unified visibility across workloads and multi cloud infrastructure. |
2:10.7 | Run confidently with secure Devops by visiting |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.