Cloud Out Loud Podcast

Episode 10 - Protecting Your Assets from Cyber Attacks

May 01, 2022 Jon and Logan Gallagher
Episode 10 - Protecting Your Assets from Cyber Attacks
Cloud Out Loud Podcast
More Info
Cloud Out Loud Podcast
Episode 10 - Protecting Your Assets from Cyber Attacks
May 01, 2022
Jon and Logan Gallagher

Protecting Your Assets From Cyber Attacks


Episode 10: Show Notes


The Russian invasion of Ukraine has caused a heightened paranoia about cyber attacks, prompting the Department of Homeland Security to release a warning that we should be prepared to respond to disruptive cyber activity. In this episode we are going to explain why transitioning to the cloud (if you aren’t already there) is the best way to make sure that your information is secure. By leveraging cloud architecture, you can protect yourself against so many different types of attacks, and the important monitoring and auditing systems are automatically available to you at no extra cost (in contrast to on-prem systems). For advice about how you can ward off a cyber attack in the cloud in a business context and a personal one, tune in for today’s episode of Cloud Out Loud! 


Key Points From This Episode:


  • Fears about a cyber attack that have gained traction since the Russian invasion of Ukraine.
  • The warning that was released by the Department of Homeland Security in February.
  • Security versus useability. 
  • Examples of how to maintain security hygiene. 
  • The additional level of security that exists in the cloud. 
  • Ease of access to monitoring and audit systems in the cloud, in comparison to on-prem systems.
  • Why it is crucial to continuously revisit your policies and make sure you are enforcing the principle of least privilege.
  • A method of assessing whether your permissions are too permissive.
  • Why a ransomware attack is more difficult to execute in the cloud.
  • Infrastructure segmentation that is possible in the cloud but not in on-prem systems. 
  • Problems that can arise when fixing security holes.
  • Why you should always stay up to date with operating system and application updates.
  • The story of the (consensual) hacking of Jeffrey Katzenberg. 


Tweetables:


“Whether you’re on premise or in the cloud, good security hygiene is your first line of defense.” — Logan Gallagher [0:03:47]


“The cloud has systems that are capturing important API calls and important commands as they happen, and give you an audit trail that you can review. Leverage that and help your security team understand what that means and align that with the data governance that you operate under.” — Jon Gallagher [0:07:26]


“My rule of thumb [is] if you spend a whole week without someone sending you an email asking for more permissions, your permissions are too permissive.” — Jon Gallagher [0:09:36]


“The cloud doesn’t think of machines, the cloud thinks of service, and when you’re using cloud SQL and RDS (and you should), the infrastructure that the service runs on is not corruptible like it is on prem.” — Logan Gallagher [0:15:30]


Links Mentioned in Today’s Episode:


Jon Gallagher on LinkedIn

Logan Gallagher on LinkedIn

The Phoenix Project

The Subtle Knife

Jeffrey Katzenberg Gets Hacked [Twitter Thread]

Show Notes

Protecting Your Assets From Cyber Attacks


Episode 10: Show Notes


The Russian invasion of Ukraine has caused a heightened paranoia about cyber attacks, prompting the Department of Homeland Security to release a warning that we should be prepared to respond to disruptive cyber activity. In this episode we are going to explain why transitioning to the cloud (if you aren’t already there) is the best way to make sure that your information is secure. By leveraging cloud architecture, you can protect yourself against so many different types of attacks, and the important monitoring and auditing systems are automatically available to you at no extra cost (in contrast to on-prem systems). For advice about how you can ward off a cyber attack in the cloud in a business context and a personal one, tune in for today’s episode of Cloud Out Loud! 


Key Points From This Episode:


  • Fears about a cyber attack that have gained traction since the Russian invasion of Ukraine.
  • The warning that was released by the Department of Homeland Security in February.
  • Security versus useability. 
  • Examples of how to maintain security hygiene. 
  • The additional level of security that exists in the cloud. 
  • Ease of access to monitoring and audit systems in the cloud, in comparison to on-prem systems.
  • Why it is crucial to continuously revisit your policies and make sure you are enforcing the principle of least privilege.
  • A method of assessing whether your permissions are too permissive.
  • Why a ransomware attack is more difficult to execute in the cloud.
  • Infrastructure segmentation that is possible in the cloud but not in on-prem systems. 
  • Problems that can arise when fixing security holes.
  • Why you should always stay up to date with operating system and application updates.
  • The story of the (consensual) hacking of Jeffrey Katzenberg. 


Tweetables:


“Whether you’re on premise or in the cloud, good security hygiene is your first line of defense.” — Logan Gallagher [0:03:47]


“The cloud has systems that are capturing important API calls and important commands as they happen, and give you an audit trail that you can review. Leverage that and help your security team understand what that means and align that with the data governance that you operate under.” — Jon Gallagher [0:07:26]


“My rule of thumb [is] if you spend a whole week without someone sending you an email asking for more permissions, your permissions are too permissive.” — Jon Gallagher [0:09:36]


“The cloud doesn’t think of machines, the cloud thinks of service, and when you’re using cloud SQL and RDS (and you should), the infrastructure that the service runs on is not corruptible like it is on prem.” — Logan Gallagher [0:15:30]


Links Mentioned in Today’s Episode:


Jon Gallagher on LinkedIn

Logan Gallagher on LinkedIn

The Phoenix Project

The Subtle Knife

Jeffrey Katzenberg Gets Hacked [Twitter Thread]