Google Cloud IAP - A Pentester Viewpoint

Google Cloud IAP - A Pentester Viewpoint

Google Cloud Security Assessment from a pentester's lens. Anjali from NotSoSecure will be sharing her research into Google Cloud IAP & finding ways to assess the use of Google Cloud IAP in your environment and what are some of the low hanging fruits that you can remove today to reduce any potential risk from the service to your Google Cloud environment.


Episode YouTube Video Link


Host Twitter: Ashish Rajan (⁠⁠⁠⁠⁠@hashishrajan⁠⁠⁠⁠⁠)

Guest Socials: Anjali S's Linkedin (Anjali S)

Podcast Twitter - ⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠⁠Cloud Security Newsletter

- ⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠


Spotify TimeStamp for Interview Questions

A word from our sponsors - you can visit them on ⁠⁠⁠⁠⁠snyk.io/csp⁠⁠⁠⁠⁠


(00:00) Introduction

(04:31) A bit about Anjali Shukla

(05:23) What is GCP IAP?

(07:18) Why is IAP so important?

(09:55) IAP and Identity Federation

(11:34) SSH vs Jump Box

(13:57) GCP IAP vs AWS Cognito

(16:22) Misconfigurations in GCP IAP

(23:17) Potential security scenarios

(25:45) Cloud Security Assessment in GCP

(28:13) Doing your own cloud security assessment

(30:49) The Fun Questions


See you at the next episode!


Jaksot(345)

Is your Microsoft Azure Cosmos Database Keys Secure? - Cloud Security News

Is your Microsoft Azure Cosmos Database Keys Secure? - Cloud Security News

Cloud Security News this week - 1 Sep, 2021 Last Thursday, on the 26th of August 2021 - Microsoft warned thousands of its cloud computing customers, including some of the world's largest companies. ...

1 Syys 20212min

Cloud Hacking eSports | Ultimate Hacking Championship

Cloud Hacking eSports | Ultimate Hacking Championship

In this episode of the Virtual Coffee with Ashish edition, we spoke with Igor Rincon (@igor.rincon) creator of Ultimate Hacking Championship (@HackingEsports) & one of the host of UHC - Magno Logan (@...

29 Elo 20215min

Network Security in a Cloud Native World

Network Security in a Cloud Native World

In this episode of the Virtual Coffee with Ashish edition, we spoke with Karthik Prabhakar (@worldhopper) is an Advisor to AccuKnox (@AccuKnox). Episode ShowNotes, Links and Transcript on Cloud Securi...

26 Elo 202151min

AWS Re:inforce goes Virtual - Cloud Security News

AWS Re:inforce goes Virtual - Cloud Security News

Cloud Security News this week - 25 Aug, 2021 AWS is launching a new partner competency for managed security service providers (MSSPs) which will make their cloud software solutions and services avai...

25 Elo 20211min

THINKING OF MOVING A MONOLITH TO CLOUD NATIVE?

THINKING OF MOVING A MONOLITH TO CLOUD NATIVE?

In this episode of the Virtual Coffee with Ashish edition, we spoke with John Kinsella (@johnlkinsella) is a Cloud Native Contributor, co-host of Security Weekly and CTO of CySense. Episode ShowNotes,...

22 Elo 202152min

DO WE NEED LOGGING? - Building Observability Platform for Scale - Atlassian

DO WE NEED LOGGING? - Building Observability Platform for Scale - Atlassian

In this episode of the Virtual Coffee with Ashish edition, we spoke with Colby Funnel (Linkedin - @Colby) is a Development Manager at Atlassian(@Atlassian). Episode ShowNotes, Links and Transcript on ...

15 Elo 202140min

What is a SECURITY DATA LAKE?

What is a SECURITY DATA LAKE?

In this episode of the Virtual Coffee with Ashish edition, we spoke with Omer Singer (Linkedin-Omer Singer) is the Head of Cyber Security Strategy at Snowflake - The Data Cloud (@SnowflakeDB). Episode...

8 Elo 202149min

Security Logging is Changing | Observability & Tracing Explained

Security Logging is Changing | Observability & Tracing Explained

In this episode of the Virtual Coffee with Ashish edition, we spoke with Ted Young (@tedsuo) is a contributor along with AWS, Google Cloud, Microsoft Azure in the Observability eco-system. He is also ...

1 Elo 202148min