How to Build AWS Multi-Account Infrastructure with Security and Speed

How to Build AWS Multi-Account Infrastructure with Security and Speed

Cloud Security Podcast - This month we are talking about "Building on the AWS Cloud" and next up on this series, we spoke to Patrick Sanders (Patrick's Linkedin) & Jospeh Kjar (Joseph's Linkedin), Snr Cloud Security Engineer at Netflix on what does it take to reimagine multi-account deployments gave them both security and speed.

Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv

Host Twitter: Ashish Rajan (@hashishrajan)

Guest Twitter: Patrick Sanders (Patrick's Linkedin) & Jospeh Kjar (Joseph's Linkedin)

Podcast Twitter - @CloudSecPod @CloudSecureNews

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- Cloud Security News

- Cloud Security BootCamp

Spotify TimeStamp for Interview Questions

(00:00) Introduction

(03:06) snyk.io/csp

(03:41) A bit about how Patrick and Joseph got into the Cloud Space

(06:00) Building blocks of scalable AWS infrastructure

(09:14) Should there be a seperate account for forensics

(12:44) Diff AWS Org for dev and prod?

(13:45) How to ensure dedicated IR account is secure?

(15:10) 1st step to building a new startup in AWS

(17:39) Should non prod and prod accounts be seperate?

(21:29) How do you ensure visibility into your AWS organisation?

(25:04) Integrate FIM into AWS

(26:29) Layers for a multi account strategy

(28:23) Challenges from going from one account to multi account

(34:03) Bringing identity to the application

(38:25) The importance of IMDS

(42:07) The security benefit of using IMDS

(45:34) Managed identity in AWS

(46:40) Why developer experience is important?

(49:49) What do cloud security engineers do ?

(53:05) Where you can find Joseph and Patrick?

See you at the next episode!

Episoder(345)

Kubernetes Network Security for Multi Tenancy

Kubernetes Network Security for Multi Tenancy

Kubernetes security explained : We spoke to Cailyn Edwards, CNCF Ambassador and Senior Security Engineer at Shopify. Interview was recorded at Kubecon NA 2023. We asked her about the complexities of K...

12 Des 202326min

AWS reInvent 2023 - Security highlights and announcements

AWS reInvent 2023 - Security highlights and announcements

Cloud Security Podcast just got back from AWS re:invent 2023, there was a lot of chat around, you guessed it - GenAI but along with that there were plenty of security updates and announcement. Shilpi ...

5 Des 202356min

eBPF - Kubernetes Network Security without the Blind Sides!

eBPF - Kubernetes Network Security without the Blind Sides!

eBPF is recent graduate in the CNCF family and this means that the world of Cloud and Kubernetes, networking looks very different with more security capabilities. Cilium the project from Isovalent has...

30 Nov 202323min

Attack Path Analysis for Better Kubernetes Security

Attack Path Analysis for Better Kubernetes Security

Kubernetes security cannot just be Kubernetes but it is like security of a datacenter within another datacenter. In this episode with Tim Miller we spoke about CNAPP, how to approach kubernetes securi...

22 Nov 202321min

Secure your SaaS applications like this!

Secure your SaaS applications like this!

SaaS Applications support large companies, small startups. We inevitably accumulate SAAS applications to manage our employees, payroll, communication with things like Workday, Slack, Salesforce and no...

21 Nov 202342min

Threat Detection for not so Common Cloud Services

Threat Detection for not so Common Cloud Services

Threat detection is often limited to popular cloud services, so whats happening to all the "not so popular or commonly known" cloud services in your environment? We are speaking to Suresh Vasudevan, C...

11 Nov 202334min

How to Escape Clusters in a Managed Kubernetes Cluster?

How to Escape Clusters in a Managed Kubernetes Cluster?

Not Escaping Containers but escaping Clusters - Managed Kubernetes distributions such as Amazon EKS, Google Kubernetes Engine (GKE) and Azure Kubernetes Service (AKS) attack vectors can allow you to r...

7 Nov 202359min

Have I lost my Secrets?

Have I lost my Secrets?

You know that feeling when you are unsure if you AWS secret that leaked is still available for use. There is no easy way to check this apart from looking in AWS to see if anyone used it. Turns out the...

6 Nov 202329min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
energi-og-klima
teknisk-sett
tomprat-med-gunnar-tjomlid
elektropodden
nasjonal-sikkerhetsmyndighet-nsm
fornybaren
rss-impressions-2
shifter
teknologi-og-mennesker
rss-polypod
rss-ai-forklart
pedagogisk-intelligens
rss-ki-praten
smart-forklart
rss-alt-vi-kan
rss-alt-som-gar-pa-strom
blaskjerm-brodrene
rss-forenklingspodden