Master Finance Tools - 35% Off CFI (Code CFI35)
AI Engineer - Learn how to integrate AI into software applications
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the hidden complexities and security blind spots within AWS Identity and Access Management through this 26-minute conference talk that challenges conventional assumptions about the shared responsibility model. Discover how seemingly distinct IAM permissions can achieve identical outcomes, creating dangerous security gaps that traditional monitoring and preventative measures often miss. Learn through progressively complex examples how duplicitous IAM permissions enable data retrieval and resource-based policy manipulation through multiple pathways, effectively turning security configuration into a challenging game of whack-a-mole. Examine real-world scenarios where blocking one IAM action proves insufficient when alternative permissions provide the same access, and understand how these overlapping capabilities create vulnerabilities in cloud security architectures. Gain insights into the practical implications of these IAM duplicities for security monitoring, alerting systems, and overall cloud defense strategies, while developing a more nuanced understanding of AWS permission structures that goes beyond surface-level security configurations.
Syllabus
The Duplicitous Nature of AWS Identity and Access Management (IAM)
Taught by
fwd:cloudsec