6:00pm - Networking & Refreshments - food & drink sponsored by Fugue
• 6:30pm - Greetings, Announcements, & a word from our sponsor
• 6:45pm - Browser-Cloud Architecture is the future
Steve Radich, Bitshop
Today utilizing a combination of Cognito Federated, Facebook (or other SSO), and Temporary Credentials (STS) we can allow our browsers direct access to our cloud resources.
• 7:15pm - Challenges & best practices for managing privilege users within your AWS
Kelvin Brewer, Saviynt, Principal Security Architect, Public Sector
Organizations with workloads on AWS often require the need for its users to have elevated permissions on AWS Console or CLI. Native AWS IAM frameworks use IAM Policies to achieve the same, often leading to elevated permissions being associated for long term or partial removal leading to residual elevated access. Also, searching for privileged activity in CloudTrail logs is a daunting task which becomes more complex with user defined role names in AWS CLI.
This presentation will review considerations, alternatives, and best practices for managing and securing privileged users within your AWS environments.
Saviynt's Security Analyzer and Privileged Access Manager/PAM for AWS.
Thanks to Fugue, our April sponsor!