Locking Down the Security of AWS IAM - Part 2

Logo
Presented by

Josh Stella, Fugue Co-Founder and CEO

About this talk

Amazon Web Service’s Identity and Access Management (IAM) service is a powerful tool for managing access to your AWS resources that’s essentially a new kind of network in the cloud. But configuring AWS IAM securely can become complex pretty quickly—and dangerous AWS IAM misconfigurations are quite common. In Part 2 of this Cloud Security Masterclass, Fugue co-founder Josh Stella digs deeper into how AWS IAM works to help you think more critically about the security for your AWS use cases. He’ll show you how hackers can exploit IAM misconfigurations so you can spot these in your environment and eliminate them.

Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (18)
Subscribers (756)
Cloud computing has turned security on its head. The cloud attack surface is the configuration of thousands of interrelated resources — and it’s all changing constantly. Ensuring continuous cloud security and compliance requires a deep understanding how cloud works and the nature of misconfiguration. Why it happens, how hackers exploit it, and how to prevent it. At Fugue, we’re committed to helping cloud professionals master the concepts they need to ensure the security of their cloud infrastructure. Our Cloud Security Masterclass series is led by Fugue CTO and co-founder Josh Stella, who has extensive experience with cloud security and working with national security customers as a Principal Solutions Architect with AWS. He takes us on technical deep dives into critical cloud infrastructure security concepts. Fugue helps cloud teams transform how they do cloud security at every stage of the software development lifecycle — so they can move faster in the cloud without breaking the rules that put data at risk.