Minimizing the Blast Radius of a Cloud Breach
You’ll walk away from this session with an understanding of how to:
- Evaluate your Identity and Access Management (IAM) resources for weaknesses that attackers can exploit
- Employ penetration testing methodologies to assess the blast radius of public-facing resource misconfigurations
- Harden your cloud security posture using policy as code to address complex, multi-resource “blast radius” risks
The recent Twitch breach may have begun with a lone server misconfiguration, but its blast radius reached everything from sensitive customer data to source code for yet-to-be-released applications. Today’s cloud attacks don’t exploit a single misconfiguration, but rather a series of them.
In this Cloud Security Masterclass, Josh Stella, Co-Founder and CEO, will walk through a process for understanding the blast radius of a variety of potential security events in your environment, and steps you can take to prevent minor ones from becoming catastrophic breaches.
Josh Stella
Josh Stella is co-founder, CTO, and CEO of Fugue, the company transforming cloud security to help teams move faster and stay secure. Through Fugue's masterclasses, Josh educates cloud and security professionals about cloud misconfiguration exploits and how to keep cloud infrastructure secure from attackers—often by demonstrating exploits in real time as a white hat hacker.
Previously, Josh was a Principal Solutions Architect at Amazon Web Services (AWS), where he supported customers in the area of national security. Josh also served as CTO for a technology startup and in numerous other IT leadership and technical roles over the past 25 years.
Areas Of Expertise: White Hat Hacking, AWS, Cloud Architecture, Cloud Security, Distributed Systems, and Open Policy Agent (OPA).