Cloud Security Masterclass: Locking Down the Security of AWS IAM-Part 1

Presented by

Josh Stella, Co-Founder and CEO of Fugue

About this talk

If you use Amazon Web Services (AWS), you’re probably making extensive use of the AWS Identity and Access Management (IAM) service. It’s a powerful tool for managing access to your AWS resources that’s essentially a new kind of network in the cloud. But AWS IAM security can become quite complex. Recent high-profile cloud-based data breaches have involved AWS IAM and aren’t the result of simple customer mistakes. Rather, advanced cloud misconfiguration attacks exploit IAM misconfigurations that compliance controls and security professionals often miss. In this Cloud Security Masterclass, Fugue co-founder Josh Stella digs into how AWS IAM works to help you think more critically about the security for your AWS use cases. You’ll understand how to identify AWS IAM misconfiguration vulnerabilities you may have missed before—and how malicious actors exploit them.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (36)
Subscribers (1878)
Cloud computing has turned security on its head. The cloud attack surface is the configuration of thousands of interrelated resources — and it’s all changing constantly. Ensuring continuous cloud security and compliance requires a deep understanding how cloud works and the nature of misconfiguration. Why it happens, how hackers exploit it, and how to prevent it. At Fugue, we’re committed to helping cloud professionals master the concepts they need to ensure the security of their cloud infrastructure. Our Cloud Security Masterclass series is led by Fugue CTO and co-founder Josh Stella, who has extensive experience with cloud security and working with national security customers as a Principal Solutions Architect with AWS. He takes us on technical deep dives into critical cloud infrastructure security concepts. Fugue helps cloud teams transform how they do cloud security at every stage of the software development lifecycle — so they can move faster in the cloud without breaking the rules that put data at risk.