Episode 25: From Excessive Permissions To Least Privileges - Automating Your IAM Roles

Episode 25 September 01, 2020 00:35:08
Episode 25: From Excessive Permissions To Least Privileges - Automating Your IAM Roles
SilverLining IL
Episode 25: From Excessive Permissions To Least Privileges - Automating Your IAM Roles

Sep 01 2020 | 00:35:08

/

Hosted By

Moshe Ferber Ariel Munafo

Show Notes

Attendees

Guest: Shira Shamban

Guest title: CEO & Co-Founder

Company: Solvo

Abstract

In modern cloud environments, Identity and Access Management controls are crucial controls. Many of the access decisions are now made not based on networking structure but rather on roles and permissions. In this episode we talk (again) with Shira Shamban, founder at Solvo about cloud IAM challenges - why is it so hard to get IAM right and how Solvo is planning to revolutionize the IAM management process. 

Timing:

0:00 Introducing our guest

3:00 Introducing cloud identity challenges 

6:20 Why role management is not enough

11:40 Why we fail to create least-privilege-roles  

15:10 How to manage IAM securly - the people angle

18:13 How to manage IAM securly - the process angle

21:08 How to manage IAM securly - the technology angle

31:08 Summary and last words

Other Episodes

Episode 44

December 22, 2021 00:25:51
Episode Cover

SilverLining Episode 44: Gaining cloud security knowledge & certification - Part 2

Guest: David W. Schropfer Guest Title: Host of DIY Cyber Guy Podcast Abstract:  Many IT & security professionals are asking what Is the best...

Listen

Episode 26

September 16, 2020 00:49:26
Episode Cover

Episode 26: Current Challenges With Cloud

This is a special episode where both of us (Moshe & Ariel – no guests this time) discuss the future of cloud computing and...

Listen

Episode 1

November 04, 2018 00:37:41
Episode Cover

Episode 1: Security Challenges With The Growing World Of Serverless Functions

Attendees Guest: Ory Segal, Puresec Guest title:  CTO & Co-Founder at PureSec Company:  Puresec is the global leader in serverless architectures security.   Serverless functions...

Listen