Cloud Security Podcast - This month we are talking about "Building on the AWS Cloud" and next up on this series, we spoke to Mrunal Shah (Mrunal's Linkedin), Head of Container Security at Warner Bros. Discovery. We talk about how to build a Container or K8s security program while best practices are maintained and team have the right capability and tools. 4 Cs - Cloud, Container & Cluster, Code can be foundational to this
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Mrunal Shah (Mrunal's Linkedin)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00) Intro
(02:01) https://snyk.io/csp
(02:30) Mrunal's Professional Background
(03:04) Why containers are popular (technical reasons)
(04:05) Why containers are popular (leadership reasons)
(05:39) Challenges with running a Container Security Program (Leadership)
(06:34) Team skill challenge in a Container Security Program
(08:57) When to pick AWS ECS vs AWS EKS?
(10:53) ECS or EKS for building Banking Applications?
(13:12) Would Kubernetes/ Containers be preferred for security reasons?
(15:04) What would Amazon's responsibility be for security with ECS/EKS?
(16:13) What is bad about working with Containers in AWS?
(19:40) Is there a need for anti-virus in a container world?
(20:36) Balance of security when working with containers?
(22:08) Threat Detection and Prevention in a Container Security Program
(22:57) Using AWS Services for Threat Detection with Containers?
(25:14) Runtime Threat Discovery vs Agentless Threat Discovery for containers in Cloud?
(29:11) Prevention on the left vs Detection on the right of SDLC
(29:22) Cluster Misconfig vs Service Misconfigurations?
(30:19) Vulnerability Management vs Misconfiguration Management?
(31:50) Inspector in a Container Security Program?
(32:36) Detective in a Container Security Program?
(35:36) Can AWS Services help when Non-AWS services are in use?
See you at the next episode!
Cloud Native Security Strategies for 2024
Real-World Cloud Security Challenges and Solutions Explained for 2024
Why Least Privilege Matters in Cloud Security?
How is Kubernetes Network Security Evolving?
The Future of Software Development with AI
The role of Real Time Defense in Cloud Security
CISO's guide to embracing risk in business
Why Email Breaches Still Happen?
Essential Strategies to master Incident Response in Cloud
From Code Suggestions to Security
Cloud Security Operations for Modern Threats
Understanding Threat Modeling in Cloud
Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis
Sidecar Container Vulnerability in Kubernetes explained
Role of application security posture management in cybersecurity
Cybersecurity Best Practices and Password Security in Cloud and AI
Multicloud strategy for AWS and GCP
AI's Role in Security Efficiency - Kubernetes Edition
Build an Effective AWS Cloud Security Program in 2024
Offensive Cloud Security Program for 2024
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast