Episodios

  • Episode 120 — IAM Deep Dive: PAM, RBAC/ABAC, PKI, KMS, SCIM, CIEM in network scenarios
    Jan 16 2026

    Identity and access management concepts are central in CloudNetX because modern network security and connectivity decisions depend on who is requesting access, what they are allowed to do, and how trust is established across systems. This episode defines PAM as managing privileged access with stronger controls and accountability, RBAC as granting permissions through role assignments, ABAC as granting permissions based on attributes and context, PKI as issuing and managing certificates that enable trusted authentication and encryption, KMS as managing cryptographic keys and rotation, SCIM as automating provisioning and deprovisioning across services, and CIEM as discovering and right-sizing cloud entitlements. The first paragraph focuses on how these capabilities influence network scenarios: identity becomes the primary control plane, privileged paths must be protected and monitored, and lifecycle automation determines whether access remains appropriate over time. It also emphasizes that many “network problems” become identity problems when cloud and hybrid models dominate, because access decisions and trust relationships are enforced through identity systems and certificates rather than through static network location.

    Más Menos
    22 m
  • Episode 119 — Conditional Access and Geofencing: policy decisions that reduce credential risk
    Jan 16 2026

    Conditional access appears in CloudNetX because it enables identity decisions based on context rather than static rules, reducing the effectiveness of stolen credentials and strengthening remote access controls. This episode defines conditional access as applying access requirements based on signals such as user risk, device compliance, network location, time, and behavior patterns, and it defines geofencing as one context signal that constrains access based on geographic location. The first paragraph focuses on the design intent: require stronger verification or deny access entirely when conditions indicate elevated risk, while allowing smoother access when conditions are normal and low risk. It explains that conditional access is a policy tool that must be aligned with business workflows, because overly strict conditions cause lockouts and unsafe workarounds, while overly loose conditions create a false sense of security. The episode frames geofencing as a supplemental control that can reduce exposure when business boundaries are clear, but that cannot be treated as a primary defense due to bypass potential and imperfect location accuracy.

    Más Menos
    20 m