Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Juan Rodriguez. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Juan Rodriguez or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cybersecurity Fundamentals : Cloud, Zero Trust, and You Chapter 6

23:24
 
Share
 

Manage episode 512590774 series 2820603
Content provided by Juan Rodriguez. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Juan Rodriguez or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

[email protected]

Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and context. It’s a practical tour from first principles to field-tested patterns, grounded by case studies like Capital One and SolarWinds and anchored in frameworks such as NIST SP 800-207.
We start by decoding public, private, hosted private, community, and hybrid models, then connect those choices to risk: multi-tenant isolation, data flows between zones, and the observability challenges of decentralization. From there, we move into reliability engineering—high availability, geo-redundancy, disaster recovery—and the role Kubernetes plays in scaling securely, with a frank look at container pitfalls and how least privilege and image scanning reduce blast radius. Automation takes center stage with infrastructure as code, autoscaling, and software-defined networking, plus how SASE brings secure access to a remote-first workforce without bolting on more complexity.
Embedded systems and IoT get a hard look: scarce memory, weak encryption, default credentials, and unpatchable firmware that turns convenience into risk. We offer a simple playbook—segment aggressively, enforce egress controls, rotate credentials, and plan device lifecycles—to stop small sensors from causing big outages. Zero Trust ties it all together: never trust, always verify; microsegment to prevent lateral movement; and evaluate every access request through identity, device health, and real-time signals. Along the way, we weave in Security+ exam-style questions so you can test your knowledge and lock in the fundamentals.
If this helped you see your cloud and Zero Trust roadmap more clearly, follow the show, share it with a teammate, and leave a quick review. Got certified recently or put these controls into practice? Email [email protected]—we’d love to shout you out on a future episode.

Support the show

If you want to help me with my research please e-mail me.
[email protected]
If you want to join my question/answer zoom class e-mail me at
[email protected]
Art By Sarah/Desmond
Music by Joakim Karud
Little chacha Productions
Juan Rodriguez can be reached at
TikTok @ProfessorJrod
[email protected]
@Prof_JRod
Instagram ProfessorJRod

  continue reading

Chapters

1. Setting The Agenda: Cloud & Zero Trust (00:00:00)

2. Cloud Deployment Models Explained (00:02:01)

3. Shared Responsibility In SaaS, PaaS, IaaS (00:04:48)

4. Centralized To Decentralized Systems (00:08:24)

5. Reliability, HA, DR, And Kubernetes (00:10:00)

6. Automation, IaC, SDN, And SASE (00:13:24)

7. Embedded Systems And IoT Risks (00:16:26)

8. Zero Trust Principles And Benefits (00:20:48)

9. Exam-Style Questions And Answers (00:22:24)

92 episodes

Artwork
iconShare
 
Manage episode 512590774 series 2820603
Content provided by Juan Rodriguez. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Juan Rodriguez or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

[email protected]

Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and context. It’s a practical tour from first principles to field-tested patterns, grounded by case studies like Capital One and SolarWinds and anchored in frameworks such as NIST SP 800-207.
We start by decoding public, private, hosted private, community, and hybrid models, then connect those choices to risk: multi-tenant isolation, data flows between zones, and the observability challenges of decentralization. From there, we move into reliability engineering—high availability, geo-redundancy, disaster recovery—and the role Kubernetes plays in scaling securely, with a frank look at container pitfalls and how least privilege and image scanning reduce blast radius. Automation takes center stage with infrastructure as code, autoscaling, and software-defined networking, plus how SASE brings secure access to a remote-first workforce without bolting on more complexity.
Embedded systems and IoT get a hard look: scarce memory, weak encryption, default credentials, and unpatchable firmware that turns convenience into risk. We offer a simple playbook—segment aggressively, enforce egress controls, rotate credentials, and plan device lifecycles—to stop small sensors from causing big outages. Zero Trust ties it all together: never trust, always verify; microsegment to prevent lateral movement; and evaluate every access request through identity, device health, and real-time signals. Along the way, we weave in Security+ exam-style questions so you can test your knowledge and lock in the fundamentals.
If this helped you see your cloud and Zero Trust roadmap more clearly, follow the show, share it with a teammate, and leave a quick review. Got certified recently or put these controls into practice? Email [email protected]—we’d love to shout you out on a future episode.

Support the show

If you want to help me with my research please e-mail me.
[email protected]
If you want to join my question/answer zoom class e-mail me at
[email protected]
Art By Sarah/Desmond
Music by Joakim Karud
Little chacha Productions
Juan Rodriguez can be reached at
TikTok @ProfessorJrod
[email protected]
@Prof_JRod
Instagram ProfessorJRod

  continue reading

Chapters

1. Setting The Agenda: Cloud & Zero Trust (00:00:00)

2. Cloud Deployment Models Explained (00:02:01)

3. Shared Responsibility In SaaS, PaaS, IaaS (00:04:48)

4. Centralized To Decentralized Systems (00:08:24)

5. Reliability, HA, DR, And Kubernetes (00:10:00)

6. Automation, IaC, SDN, And SASE (00:13:24)

7. Embedded Systems And IoT Risks (00:16:26)

8. Zero Trust Principles And Benefits (00:20:48)

9. Exam-Style Questions And Answers (00:22:24)

92 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play