Главная
Study mode:
on
1
Intro
2
Context
3
Identity
4
Permissions
5
Nonhuman identities
6
Hybrid identities
7
AWS managed policies
8
Azure managed policies
9
GCP basic roles
10
Cloud Platform Access Scope
11
Logging Limits
12
Azure Logs
13
MultiCloud Conclusion
14
What Can We Do
15
Limit Mistakes
16
Building Permissions
17
AccessUndenight
18
Demo
19
Conclusion
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the hidden risks of managing identities and access in multi-cloud environments through this 41-minute Black Hat conference talk. Uncover access flaws and misconfigurations that attackers can exploit to gain unauthorized access to sensitive information. Delve into the inner workings of various cloud providers' Identity and Access Management (IAM) layers, highlighting key differences between services. Learn how inconsistent entitlements across cloud resources can lead to unintended access and how shared responsibility model confusion enables privilege escalation. Gain insights into AWS managed policies, Azure managed policies, GCP basic roles, cloud platform access scope, and logging limitations. Discover practical strategies to limit mistakes, build proper permissions, and enhance security in multi-cloud setups. Witness a demonstration and walk away with actionable knowledge to improve your organization's cloud security posture.

IAM The One Who Knocks

Black Hat
Add to list