Using Data Perimeters in AWS To Scale Guardrails

Using Data Perimeters in AWS To Scale Guardrails

Cloud Security Podcast - AWS Network Security, IAM Security or even Organization security for what can happen in your AWS Environments can be achieved using Data perimeter. John Burgress (John - Linkedin⁠⁠⁠) from Stripe spoke about this topic at @fwdcloudsec and shared additional insights on the thinking he had when building data perimeters are guardrails. There were lot more gems dropped so def check out the episode.


Episode YouTube Video - https://youtu.be/Hs9ZEaVG7Ww


Host Twitter: Ashish Rajan (⁠⁠⁠⁠@hashishrajan⁠⁠⁠⁠)

Guest Socials: John Burgress (John - Linkedin)

Podcast Twitter - ⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠ ⁠⁠⁠⁠@CloudSecureNews⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠⁠Cloud Security News ⁠⁠⁠⁠

- ⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠


Spotify TimeStamp for Interview Questions

A word from our sponsors - you can visit them on ⁠⁠⁠⁠snyk.io/csp⁠⁠⁠⁠

(00:00) Introduction

(03:13) A word from our sponsors

(03:38) A bit about John Burgess

(04:26) Data perimeter in the Cloud

(05:10) Defining data perimeter in AWS

(06:50) Where to start building AWS data perimeter

(08:21) The defense in depth approach 09:09 Approach to enable developers

(10:40) Starting point for building data perimeter

(11:41) Limitations with Data Perimeter

(13:06) Implementing data perimeter for segregation

(15:52) Working with Terraform Modules

(16:34) Goals behind data perimeter controls

(18:31) Proactive detection for third party

(20:00) Data perimeter for other CSPs

(20:42) Challenges in establishing data perimeter

(23:06) Dealing with multiple organisations

(23:35) Learn more about data perimeter

(24:06) The fun section


These are some of the resources John found helpful for data perimeter:

See you at the next episode!

Jaksot(344)

Confidential Computing in Azure Explained

Confidential Computing in Azure Explained

In this episode of the Virtual Coffee with Ashish edition, we spoke with Steve Orrin (Steve's Linkedin) Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv H...

28 Touko 202243min

Azure Cloud Security Architecture

Azure Cloud Security Architecture

In this episode of the Virtual Coffee with Ashish edition, we spoke with Sai Gunaranjan (Sai's Linkedin) Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv ...

25 Touko 202240min

Azure Security Fundamentals Level 1

Azure Security Fundamentals Level 1

In this episode of the Virtual Coffee with Ashish edition, we spoke with Andrew Brown, ExamPro Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitt...

19 Touko 202237min

Finding Security Holes in Azure Services

Finding Security Holes in Azure Services

In this episode of the Virtual Coffee with Ashish edition, we spoke with Yoav Alon, CTO, Orca Security Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Ho...

15 Touko 202234min

Azure Kubernetes Service (AKS) Security Explained

Azure Kubernetes Service (AKS) Security Explained

In this episode of the Virtual Coffee with Ashish edition, we spoke with Jimmy Mesta, Co-Founder, KSOC Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Ho...

8 Touko 202247min

Azure Security Fundamentals - Zero Trust with Azure AD

Azure Security Fundamentals - Zero Trust with Azure AD

In this episode of the Virtual Coffee with Ashish edition, we spoke with Paul Schwarzenberger, Cloud Security Engineer, Celidor Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.c...

1 Touko 202242min

How to Secure Cloud Managed Kubernetes

How to Secure Cloud Managed Kubernetes

In this episode of the Virtual Coffee with Ashish edition, we spoke with Or Azarzar from LightSpin Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host T...

26 Huhti 202233min

Kubernetes Security Best Practices in 2022

Kubernetes Security Best Practices in 2022

In this episode of the Virtual Coffee with Ashish edition, we spoke with Ian Lewis from Google Cloud Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host...

25 Huhti 202241min