HOW TO BUILD SECURE ENVIRONMENTS IN MICROSOFT AZURE - NICHOLAS HUGHES

HOW TO BUILD SECURE ENVIRONMENTS IN MICROSOFT AZURE - NICHOLAS HUGHES

In this episode of the Virtual Coffee with Ashish edition, we spoke with Nicholas Hughes, CEO of EITR Technologies.

In this episode, Nicholas & Ashish spoke about

  • Your path into CyberSecurity
  • What does Cloud Security mean for you?
  • Where does one start when it comes to starting today in Azure?
  • What’s the highest level of segregation that one can have in Azure?
  • What does an Azure AD Tenant & Azure Subscription look like?
  • What is a Resource Group in Azure and how is it different to the one in AWS?
  • Hierarchical and Name space structure of Azure Resources
  • Why would you have a Resource Group per subscription instead of all Resource Group in one subscription?
  • Is Account/Subscription the blast radius?
  • What does blast radius mean?
  • How do you manage Compliance and Access to multiple Subscription/
  • What is Management Groups in Azure and do subscription live in there?
  • How would you structure Management Groups in a business hierarchy?
  • How does policies get applied to multiple subscriptions using Management Groups?
  • Do you share identity between subscriptions?
  • How does Identity work in Enterprise, where shared identity is the only way?
  • How does Account structure differentiate between a Startup, SMB vs Enterprise?
  • What kind of capability exist for cost?
  • What does Account Vending look like in Azure?
  • How does Azure Policy works?

ShowNotes and Episode Transcript on www.cloudsecuritypodcast.tv

Twitter - @kaizenteq @hashishrajan

If you want to watch videos of this and previous episodes:

- Twitch Channel: https://lnkd.in/gxhFrqw

- Youtube Channel: https://lnkd.in/gUHqSai

Episoder(345)

The Truth About CNAPP and Kubernetes Security

The Truth About CNAPP and Kubernetes Security

In this episode of the Cloud Security Podcast, host Ashish Rajan speaks to James Berthoty, founder of Latio.Tech and an engineer-driven analyst, for a discussion on cloud security tools. In this episo...

14 Jan 202540min

Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem

Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem

In this episode our host Ashish Rajan sat down with Ross Haleliuk, author of Cybersecurity for Builders and creator of the Venture in Security blog, to explore the current state and future of the cybe...

10 Jan 20251h 10min

Centralized VPC Endpoints - Why It Works for AWS Networking

Centralized VPC Endpoints - Why It Works for AWS Networking

In this episode, Meg Ashby, a senior cloud security engineer shares how her team tackled AWS’s centralized VPC interface endpoints, a design often seen as an anti-pattern. She explains how they turned...

17 Des 202448min

What is CADR?

What is CADR?

In this episode, recorded at Kubecon NA in Salt Lake City, we spoke about about Kubernetes security with Shauli Rozen, co-founder and CEO of ARMO Security. From the challenges of runtime protection to...

5 Des 202429min

Building Platforms in Regulated Industries

Building Platforms in Regulated Industries

At HashiConf 2024 in Boston, our host Ashish Rajan had a great chat over some cannolis and a game of Jenga with AJ Oller, AVP of Engineering at The Hartford about how automation, mainframes, and compl...

21 Nov 202436min

Dynamic Permission Boundaries: A New Approach to Cloud Security

Dynamic Permission Boundaries: A New Approach to Cloud Security

In this episode, Ashish spoke with Kushagra Sharma, Staff Cloud Security Engineer, to delve into the complexities of managing Identity Access Management (IAM) at scale. Drawing on his experiences from...

12 Nov 202446min

Building a Resilient Cloud Security Program after Merger and Acquisition

Building a Resilient Cloud Security Program after Merger and Acquisition

In this episode, host Ashish Rajan sits down with Prahathess Rengasamy, a cloud security expert with extensive experience at companies like Credit Karma, Block, and Apple. Together, they explore the c...

9 Nov 202439min

Building Data Perimeter in Cloud in 2024

Building Data Perimeter in Cloud in 2024

In this episode, Ashish gets into the critical topic of data perimeters in AWS with our guest, Tyler Warren, a Lead Cloud Security Engineer at USAA. As cloud environments continue to evolve, the impor...

31 Okt 202456min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
energi-og-klima
teknisk-sett
tomprat-med-gunnar-tjomlid
elektropodden
nasjonal-sikkerhetsmyndighet-nsm
fornybaren
rss-impressions-2
shifter
teknologi-og-mennesker
rss-polypod
pedagogisk-intelligens
rss-ai-forklart
smart-forklart
rss-ki-praten
i-loopen
rss-digitaliseringspadden
rss-alt-vi-kan
rss-forenklingspodden