All Episodes

Displaying 21 - 40 of 88 in total

Episode 21 — Secure service accounts with strict scope, limited lifetime, and clear ownership

Service accounts are often the quiet backbone of cloud automation, and they are also a frequent root cause of high-impact compromise when they are over-permissioned or...

Episode 22 — Reduce session risk with short lifetimes, reauthentication, and device-aware access

Session controls determine how long an attacker can operate after stealing a token, cookie, or session credential, making this a core governance topic for both exam sc...

Episode 23 — Harden authentication using MFA, phishing resistance, and conditional access logic

Authentication is the front door for cloud control planes, and the GCLD exam expects you to understand how stronger authentication directly reduces breach probability....

Episode 24 — Validate federation patterns so enterprise identity extends safely into cloud services

Federation can simplify identity operations, but it can also amplify enterprise compromise into cloud compromise if patterns are implemented carelessly. This episode e...

Episode 25 — Secure third-party access by scoping permissions, monitoring behavior, and revoking fast

 Third-party access is common for vendors, MSPs, auditors, and SaaS integrations, and it is a recurring risk theme because external identities often receive broad acce...

Episode 26 — Control external access by limiting public endpoints and enforcing private connectivity

External access design determines whether attackers can reach your services at all, so this episode connects network exposure decisions to governance outcomes and exam...

Episode 27 — Prevent accidental exposure by verifying default-deny behaviors and explicit allow lists

Many cloud incidents begin with an assumption that something is private when it is not, and this episode trains you to validate exposure rather than trust defaults. Yo...

Episode 28 — Implement safe remote administration paths that reduce internet-facing management risk

Remote administration is necessary, but exposing management interfaces to the internet increases both attack surface and operational risk. This episode explains how to...

Episode 29 — Apply IAM best practices to external entry points so access stays intentional

External entry points—whether APIs, portals, or admin services—become safer when IAM is applied as the primary control, not an afterthought. In this episode, you’ll co...

Episode 30 — Secrets Management: eliminate hardcoded keys and reduce credential lifetime aggressively

Secrets management is a cornerstone control because hardcoded keys and long-lived credentials convert minor mistakes into major breaches. This episode defines secrets ...

Episode 31 — Store secrets safely using managed services, encryption, access controls, and logging

This episode explains what “safe secret storage” really means in cloud environments and why it repeatedly appears on the GCLD exam as a leadership control decision, no...

Episode 32 — Rotate secrets reliably with automation that prevents outages and forgotten credentials

 This episode focuses on rotation as an operational capability that reduces long-term compromise risk, and it frames rotation in the way exam questions often do: as a ...

Episode 33 — Scope secrets to least privilege so one leak cannot unlock broad cloud access

This episode teaches how to apply least privilege specifically to secrets, which is a high-leverage control because secrets often grant direct access to data stores, c...

Episode 34 — Deliver secrets to workloads safely without embedding them in images or source code

This episode addresses a common cloud security failure: secrets leaking through build artifacts, repositories, or container images, which creates uncontrolled distribu...

Episode 35 — Cloud Automation: use Infrastructure as Code to make security repeatable and testable

This episode explains why Infrastructure as Code is a governance tool as much as an engineering tool, and why the GCLD exam emphasizes repeatability, reviewability, an...

Episode 36 — Prevent configuration drift with policy-as-code and continuous posture enforcement

This episode focuses on drift as an inevitability in cloud environments and teaches how to prevent it through enforceable, automated controls rather than periodic manu...

Episode 37 — Secure CI/CD pipelines so build systems cannot become attacker bridges

This episode teaches why CI/CD pipelines are high-value targets and how to secure them so attackers cannot use build systems to pivot into production. You’ll define pi...

Episode 38 — Validate automated deployments with approvals, change tracking, and safe rollback patterns

This episode focuses on controlling speed safely, which is a common leadership challenge and an exam-relevant governance theme in cloud operations. You’ll learn how ap...

Episode 39 — Automate guardrails that block risky storage, network, and IAM configurations instantly

This episode explains how automated guardrails prevent common cloud incidents by stopping dangerous configurations before they reach production, which is central to se...

Episode 40 — Frameworks for built-in security: map provider native capabilities into reliable patterns

This episode teaches how to translate provider-native security capabilities into repeatable patterns that teams can adopt consistently, which supports both exam reason...

Broadcast by