Episode 21 — Secure service accounts with strict scope, limited lifetime, and clear ownership

Service accounts are often the quiet backbone of cloud automation, and they are also a frequent root cause of high-impact compromise when they are over-permissioned or poorly tracked. In this episode, you’ll define service accounts and workload identities, then connect them to least privilege, scoped resource access, and “who owns it” accountability that the GCLD exam expects you to reason about. We’ll cover best practices like separating human and non-human identities, using narrowly defined roles, limiting where credentials can be used, and setting clear rotation and deprovisioning triggers when apps change or retire. You’ll also troubleshoot common failure patterns, such as shared service accounts across teams, long-lived secrets embedded in deployment pipelines, and missing inventory that prevents rapid revocation during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 21 — Secure service accounts with strict scope, limited lifetime, and clear ownership
Broadcast by