Episodios

  • Welcome to Certified: The GIAC GPCS Audio Course
    Feb 10 2026

    The podcast delivers practical cloud security guidance for professionals who have to ship real systems on real timelines. Episodes focus on the moves that prevent costly incidents: reducing accidental exposure, tightening identity and permissions, hardening serverless triggers, securing managed platforms, and building durable defaults that survive updates and team changes. The approach is technical and operational, with clear explanations that translate directly into repeatable patterns.

    Each topic is designed to help you think like both a defender and an architect: what attackers exploit first, where misconfigurations hide, and how to constrain blast radius without slowing delivery. If you want deeper reference material, a companion book expands the same concepts in a structured format, and a flash cards book supports fast review and retention for day-to-day work, interviews, and certification prep.

    Más Menos
    1 m
  • Episode 60 — Secure serverless event triggers so trusted inputs cannot be quietly replaced
    Feb 10 2026

    This episode explains why event triggers are a primary trust boundary in serverless architectures, because whoever controls the trigger often controls when and how your function executes, and the GPCS exam expects you to reason about trusted inputs and integrity. You’ll define triggers broadly—HTTP endpoints, message queues, storage events, schedules, and integration events—and then map how trigger misconfiguration can allow unauthorized invocation, replay, or substitution of “trusted” events with attacker-controlled payloads. We’ll walk through a scenario where a function is designed to run only on internal events, but a trigger configuration change or permissive access policy allows external actors to invoke it, leading to data access through the function’s permissions. You’ll learn best practices such as authenticating and authorizing invocation, restricting who can modify trigger configuration, validating event source identity, and logging both the trigger source and downstream actions so investigations can prove cause and effect. The goal is to ensure the function’s execution path remains trustworthy even as teams evolve event routing over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    16 m
  • Episode 59 — Prevent serverless privilege overreach with tight identity and resource scopes
    Feb 10 2026

    This episode focuses on least privilege for serverless workloads, because functions often start small but accumulate permissions as teams add features, and the GPCS exam regularly tests whether you can spot privilege overreach hidden behind “it’s just a function.” You’ll define function identity, permission scope, and resource boundaries, then learn how to map each function’s actions to the smallest set of allowed operations on the smallest set of resources. We’ll cover common overreach patterns such as granting broad access to storage, messaging, or key services “for convenience,” permissions that allow role assumption into stronger identities, and policies that include wildcard actions or resources that expand over time. A scenario follows a function that only needs to read from one queue and write to one database, but is given sweeping permissions that enable lateral movement and data access across environments; you’ll tighten identity scope and validate the function still performs its job while escalation paths fail. This prepares you for exam questions that ask for the best permission design and for real engineering reviews where security must not break reliability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    16 m
  • Episode 58 — Harden serverless functions to block persistence, reinfection, and silent reuse
    Feb 10 2026

    This episode explains hardening strategies for serverless functions with a focus on attacker goals that are easy to miss: persistence through configuration changes, reinfection through supply chain or deployment paths, and silent reuse of compromised identities or triggers. You’ll define persistence in serverless terms, including modified environment variables, altered triggers, injected dependencies, or deployment pipeline abuse that reintroduces malicious changes after cleanup. We’ll walk through a scenario where a function is cleaned up after suspicious activity, but the attacker retains access by modifying a trigger or redeploying through a compromised automation identity, and you’ll design controls that prevent recurrence. You’ll learn best practices such as restricting who can change function configuration, locking down deployment roles, limiting outbound access, using short-lived credentials where possible, and ensuring logs can correlate invocations to configuration states at the time of execution. The emphasis is on making serverless security durable against repeated attempts, which is both operationally realistic and exam-aligned. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    18 m
  • Episode 57 — Assess serverless environments for misconfigurations that enable takeover
    Feb 10 2026

    This episode focuses on assessing serverless deployments for the misconfigurations that enable compromise quickly, matching exam questions that ask you to identify the highest-impact weakness in an event-driven design. You’ll define the main assessment targets: function permissions, trigger exposure, environment configuration, dependency integrity, and observability, then learn how a single misconfiguration can turn a low-risk function into a control-plane bridge. A scenario follows a function with a broad role that can modify identity or storage services; an attacker gains invocation capability and uses the function’s permissions to pivot into wider cloud access. You’ll practice assessment steps that separate “code flaw” from “platform misconfiguration,” such as checking whether invocation is authenticated, whether triggers are constrained, whether the role can assume other roles, and whether logs capture invocation source and downstream API calls. The outcome is a repeatable assessment approach that applies across providers and helps you eliminate distractors on the exam. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    15 m
  • Episode 56 — Secure serverless architectures by understanding their real attack surfaces
    Feb 10 2026

    This episode introduces serverless security by focusing on what changes compared to traditional compute: you manage less infrastructure, but you rely more heavily on identity, event inputs, and managed service integrations, which the GPCS exam treats as primary attack surfaces. You’ll define serverless functions, managed runtimes, and event-driven execution, then map the real risks: overly permissive function identities, exposed invocation paths, unsafe dependencies, secrets in environment variables, and weak logging that hides short-lived execution. We’ll use a scenario where a function is triggered by an external-facing event source and processes untrusted input, and you’ll trace how attackers can exploit input handling to access sensitive data or misuse downstream permissions. You’ll also learn how to think about boundaries in serverless: what the function can reach, what can reach the function, and what evidence exists to prove how it was used during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    15 m
  • Episode 55 — Verify hardened configurations remain stable through updates and team changes
    Feb 10 2026

    This episode teaches configuration stability as a security requirement, because managed platforms change through provider updates, feature toggles, and team-driven modifications, and the GPCS exam often tests continuous validation rather than one-time setup. You’ll define drift for managed application services, including settings that silently revert, new defaults introduced by platform updates, and permission creep caused by role reuse or new operational tooling. We’ll walk through a scenario where a platform update changes a networking or authentication behavior and a previously hardened service becomes reachable in an unexpected way, then you’ll practice building verification routines that catch the change quickly. You’ll also cover best practices like baseline comparisons, change alerts on high-impact settings, periodic access reviews for service administrators, and validating logs still capture control-plane changes and runtime access patterns. The goal is to ensure your hardening remains true over time, not just true on day one, which is both exam-relevant and operationally critical. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    19 m
  • Episode 54 — Build secure defaults for cloud application services that teams will keep
    Feb 10 2026

    This episode explains how to create secure defaults that are durable in real organizations, because the exam expects you to choose answers that reduce risk without relying on perfect human behavior. You’ll define secure defaults as baseline configurations applied consistently through templates, policies, and deployment pipelines, so teams inherit safe choices automatically and exceptions become explicit and reviewable. We’ll cover what defaults matter most for application services: minimizing public exposure, enforcing strong authentication, restricting runtime identity permissions, protecting configuration and secrets, enabling useful logs, and preventing risky administrative features from being enabled casually. A scenario compares two teams: one that hardens services manually after deployment and repeatedly misses settings under time pressure, and another that bakes defaults into deployment patterns so every new service starts hardened. You’ll also learn how to design exceptions that do not become permanent drift, including time limits, compensating controls, and evidence that the exception was approved and monitored. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    20 m