Screaming in the Cloud - Security for Speed and Scale with Ashish Rajan

Episode Date: November 22, 2022

About AshishAshish has over 13+yrs experience in the Cybersecurity industry with the last 7 focusing primarily helping Enterprise with managing security risk at scale in cloud first world and... was the CISO of a global Cloud First Tech company in his last role. Ashish is also a keynote speaker and host of the widely poplar Cloud Security Podcast, a SANS trainer for Cloud Security & DevSecOps. Ashish currently works at Snyk as a Principal Cloud Security Advocate. He is a frequent contributor on topics related to public cloud transformation, Cloud Security, DevSecOps, Security Leadership, future Tech and the associated security challenges for practitioners and CISOs.Links Referenced:Cloud Security Podcast: https://cloudsecuritypodcast.tv/Personal website: https://www.ashishrajan.com/LinkedIn: https://www.linkedin.com/in/ashishrajan/Twitter: https://twitter.com/hashishrajanCloud Security Podcast YouTube: https://www.youtube.com/c/CloudSecurityPodcastCloud Security Podcast LinkedIn: https://www.linkedin.com/company/cloud-security-podcast/

Transcript
Discussion (0)
Starting point is 00:00:00 Hello, and welcome to Screaming in the Cloud, with your host, Chief Cloud Economist at the Duckbill Group, Corey Quinn. This weekly show features conversations with people doing interesting work in the world of cloud, thoughtful commentary on the state of the technical world, and ridiculous titles for which Corey refuses to apologize. This is Screaming in the Cloud. This episode is sponsored in part by our friends at Thinks Canary. Most folks find out way too late that they've been breached.
Starting point is 00:00:38 Thinks Canary changes this. Deploy Canaries and Canary tokens in minutes and then forget about them. Attackers tip their hand by touching them, giving you one alert when it matters. With zero administrative overhead and almost no false positives, Canaries are deployed and loved on all seven continents. Check out what people are saying at canary.love today. This episode is brought to you in part by our friends at Veeam. Do you care about backups? Of course you don't. Nobody cares about backups. Stop lying to yourselves. You care about restores, usually right after you didn't care enough about backups. If you're tired of the
Starting point is 00:01:17 vulnerabilities, costs, and slow recoveries when using snapshots to restore your data, assuming that you even have them at all, living in AWS land, there's an alternative for you. Check out Veeam. That's V-E-E-A-M for secure, zero-fuss AWS backup that won't leave you high and dry when it's time to restore. Stop taking chances with your data. Talk to Veeam. My thanks to them for sponsoring this ridiculous podcast. Welcome to Screaming in the Cloud. I'm Corey Quinn. This promoted episode is brought to us once again by our friends at Snyk. Snyk does amazing things in the world of cloud security and terrible things with the English language because despite raising a whole boatload of money, they still stubbornly refuse to buy a vowel in their name. I'm joined today by Principal
Starting point is 00:02:11 Cloud Security Advocate from Snyk, Ashish Rajan. Ashish, thank you for joining me. Thank you for having me. I'm looking forward to this conversation. Your history is fascinating to me because you've been around for a while on a podcast of your own, the Cloud Security Podcast. But until relatively recently, you were a CISO. As has become relatively accepted in the industry, the primary job of a CISO is to get themselves fired.
Starting point is 00:02:38 And then, well, great, what's next? Well, failing upward is really the way to go wherever possible. So now you are at sneak helping the rest of us fix our security. That's my headcanon on all of that anyway, which I'm sure bears scant, if any, resemblance to reality. What's your version? Well, fortunately, I wasn't fired. And I think I definitely find that it's a great way to look at the CISO job to walk towards a path where you're no longer required because then I think you've definitely done your job.
Starting point is 00:03:07 I moved into the media space because we got an opportunity to go full-time. I spoke about this offline, but an incident inspired us to go full-time into the space. So that's what made me leave my CISO job and go full-time into democratizing cloud security as much as possible for anyone and everyone. Talk about every day, almost now. So it's almost like I dream about cloud security as well now.
Starting point is 00:03:29 Yeah, I dream of cloud security too, but my dreams are of a better world in which people didn't tell me how much they really care about security in emails that demonstrate how much they failed to care about security until it was too little, too late. I was in security myself for a while and got out of it because I was tired of being miserable all the time. But I feel that there's a deep spiritual alignment between people who care about cost and people who care about security when it comes to cloud or business in general, because you can spend infinite money on those things, but it doesn't really get your business further. It's like paying for fire insurance.
Starting point is 00:04:08 It isn't going to get you your next milestone. Whereas shipping faster, being more effective at launching a feature into markets, that can multiply revenue. That's what companies are optimized around. It's, oh, right, we have to do the security stuff or we have to fix the AWS billing piece. It feels on some level like it's a backburner project most of the time, and it's certainly invested in that way. What's your take on that?
Starting point is 00:04:34 I tend to disagree with that for a couple of reasons. Excellent, I love arguments. I feel this in a healthy way as well. A, I love the analogy of the spiritual animals that they are cost optimization as well as the risk aversion as well. I think where I normally stand, and this is what I had to unlearn after doing years of cybersecurity, was that initially, we always used to be, or when I say we, I mean, cybersecurity folks, we always used to be like police officers, is that every time there's an incident, it turns into a crime scene. And suddenly we're all like, pew, pew, pew.
Starting point is 00:05:07 We're trying to get all the evidence together. Let's make this isolated as much as isolated as possible from the rest of the environment. And let's try to resolve this. I feel like in cloud has asked people to become more collaborative, which is a good problem to have. It also encourages fact.
Starting point is 00:05:23 I don't know how many people know this, but the reason we have brakes in our cars is not because we can slow down the car. It's so that we can go faster. And I feel security is the same thing. The guardrails we talk about, the risks that we're trying to avert, the reason you're trying to have security
Starting point is 00:05:40 is not to slow down, but to go faster. So for example, in an ideal world, to quote what you were saying earlier, if we were to do the right kind of encryption, I'm just going to use the most basic example. If we just do encryption, right, and just ensure that as a guardrail, the entire company needs to have encryption address, encryption transit, period, nothing else. No one cares about anything else. But if you just lay that out as a framework,
Starting point is 00:06:06 okay, this is our guardrail. No one breaks this. And whoever does, hey, we slap on the wrist and come back onto the actual track, but keep going forward. That just means any project that comes in that meets that criteria keeps going forward. As many times as they want to go into production, it doesn't matter.
Starting point is 00:06:22 So that is the new world of security that we are being asked to move towards where Amazon re-invent is coming in. There will be another, I don't know, three, 400 services that will be released. How many people, irrespective of security, would actually know all of those services? They would not. So... Oh, we've long since passed the point where I can convincingly talk about AWS services that don't really exist and not get called out on it by Amazon employees. No one keeps them all in their head, except me, because I'm sad. Oh, no, but I think you're right, though.
Starting point is 00:06:52 I can't remember who was it. Maybe Andrew Vogel or someone. They did release a service which didn't exist and became like a thing on Twitter. Ah, AWS Infinidash. I want to say that was Joe Nash out of Twilio at the time. I don't recall offhand if I'm right on that, but that's how it feels. Yeah, it was certainly not me. People said that was my idea. Nope, nope. I just basically amplified it to a huge audience. But yeah, it was a brilliant idea just because it's a fake service. So everyone could tell stories
Starting point is 00:07:21 about it and amazing product feedback. If you look at it through the right lens of how people view your company and your releases when they get this perfect platonic ideal of what it is you might put out there what do people say about it yeah i think that's your point i use that as an example as well to talk about things that they would always be a service which we would be told about for the first time, which we would not know. So going back to the unlearning part, as a security team, we just have to understand that we can't use the old ways of,
Starting point is 00:07:52 hey, I want to have all the controls possible, cover all the risks possible. I need to have a better understanding of all the cloud services because I've done under 15 years of cloud. There is no one that has done 15 years of cloud, unless you're, I don't you're someone from Amazon employee yourself. Most people these days still have five to six years of experience.
Starting point is 00:08:10 And they're still learning. Even the cloud engineering folks or the DevOps folks are still learning. And the tooling is continuing to evolve. So yeah, I think I definitely find that the security in this cloud world is a lot more collaborative. And it's being looked at as the same function as a brake would have in a car to help you go faster. And now to just slam the brake every time it's like, oh, my God, is the situation less isolated to police people. One of the points I find that is so aligned between security and cost, and you alluded to it a minute ago, is the idea of helping companies go faster safely. To that end, guardrails have to be at least as easy as just going off and doing it cowperson style. Because if it's not,
Starting point is 00:08:54 it's more work in any way, shape, or form, people won't do it. People will not tag their resources by hand. People will not go through and use the dedicated account structure you've got that gets in their way and screams at them every time they try to use one of the native features built into the platform. It has to get out of their way and make things easier, not worse. Or people fight it, they go around it, and you're never going to get buy-in. Do you feel like cost is something that a lot more people pay a lot more attention to because you know that creeps into your budget like as people who've been leaders before and this is a conversation they would just go well i only have i don't know a hundred thousand to spend this quarter or this year and they are the ones who are some of them i remember i used to have this manager once the cto
Starting point is 00:09:40 would always be conscious about the spend it's almost like if you overspend, where do you get the money from? There's no money to bring in extra. Like, you know, there's a set money that people plan for in a year for a budget. And to your point about if you're not keeping an eye on how are we spending this in the AWS context, because it's very easy to spend the entire money in one day
Starting point is 00:10:01 in the cloud context. So I wonder if that is also a big driver for people to feel cost above security. Where do you stand on that? When it comes to cost, one of the nice things about it, and this is going to sound sarcastic, but I swear to you, it's not. It's only money. Think about that for a second, because it's true. Okay, we wound up screwing up and misconfiguring something and overspending. Well, there are ways around that. You can call AWS, you can get credits, you can get concessions made for mistakes, you
Starting point is 00:10:33 can sign larger contracts and get a big pile of proof of concept credits, etc., etc. There are ways to make that up. Whereas with security, there are no do-overs on security breaches. No, that's a good point. I mean, you can always get more money, use a credit card, worst case scenario, but you can't do the same for a security breach. And suddenly now, hopefully you don't have to call New York Times and say, can you undo that article that you just had posted? That totally was a mistake. We rewinded what we did. I'm curious to know what your take is
Starting point is 00:11:03 these days on the state of the cloud security community. And the reason I bring that up is, well, I started about a year and a half ago now doing a podcast every Thursday, which is last week in AWS Security Edition. edition because everything else I found in the industry that when I went looking was aimed explicitly at either the driven by the InfoSec community, which is toxic and a whole bunch of assumed knowledge already built in that looks an awful lot like gatekeeping, which is the reason I got out of InfoSec in the first place, or alternately was completely vendor captured where, okay, great. We're going to go ahead and do a whole bunch of interesting content. And it's all brought to you by this company. And strangely, all of the content is directly aligned with doing some pretty weird things that you wouldn't do
Starting point is 00:11:56 unless you're trying to build a business case for that company's product. And it just feels hopelessly compromised. I wanted to find something that was aimed at people who had to care about security, but didn't have security as part of their job title. Think DevOps types, and you're getting warmer. That's what I wound up setting out to build. And when all was said and done, I wasn't super thrilled with honestly how alone it still felt. You've been doing this for a while and you're doing a great job at it. Don't get me wrong.
Starting point is 00:12:28 But there is the question that, and I understand they're sponsoring this episode, but the nice thing about promoted guest episodes is that they can buy my attention, not my opinion. How do you retain creative control of your podcast while working for a security vendor? So that's a good question. So Snyk by themselves have not ever asked us to change any piece of content. We have been working with them for the past few months now. The reason we kind of came
Starting point is 00:12:55 along with Snyk was the alignment. And we were talking about this earlier for, I totally believe that DevSecOps and cloud security are ultimately going to come together one day. That may not be today. That may not be tomorrow. That may not be in 2022 or maybe 2023. But there would be a future where these two would sit together. And the developer-first security mentality that they had in this context from a cloud
Starting point is 00:13:18 perspective, developers being the cloud engineers, the DevOps people, as you called out, the reason you went in that direction, I definitely want to work with them. And ultimately, there would never be enough people in security to solve the problem. That is the harsh reality. There would never be enough people. So whether it's cloud security or not, like for people who were at AWS Reinforce, the first 15 minutes by Steve Schmidt, CISO of Amazon, was get a security guardian program. So I've been talking about it. Everyone else is talking about it. Now, Amazon has become the first CSP to even talk about this publicly as well, that we should have security guardians, which, by the way, I don't know why, but you can still call it, it is technically DevSecCost,
Starting point is 00:14:01 what we're trying to do. They spoke about a security champion program as part of the keynote that they were running. Nothing to do with cloud security. But the idea being, how much of this workload can we share? We can raise as a security team, for people who may be from a security background listening to this, how much elevation can we provide to risk
Starting point is 00:14:19 in front of the right people who are decision maker? That is our role. We help them with the governance. We help with managing it. But we don't know how to solve the risk or close off a risk or close off a vulnerability because you might be the best person because you work in that application every day.
Starting point is 00:14:36 You know the bandages that are put in. You know all the holes that are there. So the best threat model can be performed by the person who works on it day to day, not a security person who spends like an hour with you once a week, because that's the only time
Starting point is 00:14:50 they could manage. So coming back to the sneak part, that's the mission that we have had with the podcast. We want to democratize cloud security and build a community around neutral information. There's no biased information.
Starting point is 00:15:02 And I agree with what you said as well, where a lot of the podcasts outside of what we were finding was more focused on, hey, this is how you use AWS. This is how you use Azure. This is how you use GCP. But none of them were unbiased in the opinion because the real life, let's just say, even if I use the AWS example, because we're coming close to AWS reInventvent they don't have all the answers from a security perspective they don't have all the answers from an infrastructure perspective or cloud native perspective so there are sometimes or even most times people are making a call where they're going outside of it so unbiased information is definitely required and it is not there enough so I'm glad that at least people like yourself are
Starting point is 00:15:43 joining and you and creating the world where more people are trying to be relatable to DevOps people, as well as the security folks, because it's hard for a security person to be a developer, but it's easy for a developer or an engineer to understand security. The simplest example I use is when people walk out of their house, they lock the door, they're already doing security. This is the same thing we're asking when we talk about security in the cloud or in the court as well. Everyone is. It just hasn't been pointed out in the right way.
Starting point is 00:16:13 I'm curious as to what it is that gets you up in the morning. Now, I know you work in security, but you're also not a CISO anymore. So I'm not asking what gets you up at 2 a. we know what happens in the security space then. There's a reason that my area of business focus is strictly a business hours problem. But I'd love to know what it is about cloud security as a whole that gets you excited. I think it's an opportunity for people to get into the space without the, you know, you said gatekeeper earlier, those gatekeepers who used to have that 25 years experience in cybersecurity, 15 years experience in cybersecurity.
Starting point is 00:16:54 Cloud has challenged that norm. Now, none of that experience helps you do AWS services better. It definitely helps you with the foundational pieces, definitely helps you do identity, networking, all of that. But you still have to learn something completely new, a new way of working, which allows for a lot of people who earlier was struggling to get into cybersecurity, now they have an opening. That's what excites me about cloud security, that it has opened up a door which is beyond
Starting point is 00:17:24 your CCNA, CISSP and whatever other certification that people want to get. By the way, I don't have a CISSP, so I can totally throw CISSP under the bus. But I definitely find that cloud security excites me every morning because it has shown me light where to what you said, it was always a gated community. Although that's a very huge generalization, there's a lot of nice people in cybersecurity who want to mentor and help people get in. But cloud security has pushed through that door, made it even wider than it was before. I think there's a lot to be said for the concept of sending the elevator back down.
Starting point is 00:18:06 I really have remarkably little patience for people who take the perspective of, well, I got mine, so screw everyone else. The next generation should have it easier than we did, figuring out where we land in the ecosystem, where we live in the space. And there are folks who do a tremendous job of this, but there are also areas where I think there is significant need for improvement. I'm curious to know what you see as lacking in the community ecosystem for folks who are just dipping their toes into the water of cloud security. I think that one, there's misinformation as well. The first one being, if you have never done IT before, you can get into cloud security and you'll do a great job.
Starting point is 00:18:50 I think that is definitely a mistake to just accept the fact if Amazon re-invents LCU to all these certifications or Azure does the same or GCP does the same. If I'll be really honest, and I feel like I can be honest, it's a safe space that for people who are listening in, if you're coming to the space for the first time, whether it's cloud or cloud security, if you haven't had much exposure to the foundational pieces of IT, it would be a really hard call. You would know all the AWS services, you would know all the Azure services because you're in the certification. But if I was to ask you, hey, help me build an application,
Starting point is 00:19:26 what would the architecture look like so it can scale? So right now, we are a small piece of size 10 people team. I'm going to use the Amazon term there. But we want to grow into a Facebook tomorrow. So please build me an architecture that can scale. And if you regurgitate what Amazon has told you
Starting point is 00:19:42 or Azure has told you or GCP has told you, I can definitely see that you would struggle in the industry because that's not how, say, every application is built because the cloud service provider would ask you to drink their Kool-Aid and say they can solve all your problems, even though they don't have all the services in the world. So that's the first misinformation. The other one, for people who are transitioning, who used to be in IT or in cybersecurity and trying to get into the cloud security space, the challenge over there is that outside of Amazon, Google, and Microsoft, there is not a lot of formal education which is unbiased. There's a great way to learn AWS security on how amazing AWS is from AWS people,
Starting point is 00:20:27 the same way Microsoft, Google Cloud. However, when it comes down to actual formal education, like the kind that you and I are trying to provide through our podcast, me for the Cloud Security Podcast, you with last weekend AWS in the security edition, that kind of unbiased formal education, like free education,
Starting point is 00:20:44 like what you and I are doing does definitely exist. And I guess I'm glad we have company that you and I both exist in the space. But formal education is very limited. It's always behind, say, an expensive paid wall sometimes. And rightly so, because this is information that would be helpful. So yeah, those two things. This episode is sponsored in part by our friends at Optics. Attackers don't think in silos, so why would you have siloed solutions protecting cloud, containers, and laptops distinctly?
Starting point is 00:21:14 Meet Optics, the first unified solution that prioritizes risk across your modern attack surface, all from a single platform, UI, and data model. Stop by booth 3352 at AWS reInvent in Las Vegas to see for yourself and visit uptix.com. That's U-P-T-Y-C-S dot com. My thanks to them for sponsoring my ridiculous nonsense. One of the problems that I have with the way a lot of cloud security stuff is situated is that you need to have something running to care about the security of.
Starting point is 00:21:53 Yeah, I can spin up a VM in the free tier of most of these environments, and okay, how do I secure a single Linux box? Okay, yes, there are a lot of things you can learn there, but it's very far from a holistic point of view. You need to have the infrastructure running at reasonable scale first in order to really get an effective lab that isn't contrived. Now, Snyk is a security company. I absolutely understand and have no problem with the fact that you charge your customers money
Starting point is 00:22:22 in order to get security outcomes that are better than they would have otherwise. I do not get why AWS and GCP charge extra for security, and I really don't get why Azure charges extra for security and then doesn't deliver security by dropping the ball on it, which is neither here nor there. It feels like there's an economic form of gatekeeping where you must spend at least this much money or work for someone who does in order to get exposure to security the way the grown-ups think about it. Because otherwise, all right, I hit my own web server, I have 10 lines in the logs. Now, how do I wind up doing an analysis run to figure out what happened? I pull
Starting point is 00:23:01 it up on my screen and I look at it. You need a point of scale before anything that the modern world revolves around doesn't seem ludicrous. That's a good point also, because we don't talk about the responsibility that the cloud service provider has themselves for security. The encryption example that I used earlier as a guardrail, it doesn't take much for them to enable by default. But how many do that by default? I feel foolish sometimes to talk to tell people that, hey, you should have encryption enabled on your storage, which is at rest or in transit. It should be like we have services like Let's Encrypt and other services which are trying to make this easily available to everyone. So everyone can do SSL or HTTPS.
Starting point is 00:23:44 And also, same goes for encryption. It's free. And given the choice that you can go customer-based keys or your own key or whatever, but it should be something that should be default. We don't have to remind people, especially if you're the provider of the service, I agree with you on the very basic principle of why do I pay extra for security when you should have already covered this for me as part of the service? Because hey, technically, aren't you also responsible in this conversation? But the way I see shared responsibility is that
Starting point is 00:24:17 someone on the podcast mentioned it, and I think it's true. Shared responsibility means no one's responsible. And this is the kind of world we're living in because of that. Shared responsibility has always been an odd concept to me because AWS is where I first encountered it. And they, from my perspective, turn what fits into a tweet into a 45-minute dog and pony show around, ah, this is how it works. This is the part we're responsible for.
Starting point is 00:24:44 This is the part where the customer responsibility is. Now let's have a mind-numbingly boring conversation around it. Whereas, yeah, there's a compression algorithm here. Basically, if the cloud gets breached, it is overwhelmingly likely that you misconfigured something on your end, not the provider doing it, unless it's Azure, which is neither here nor there, once again.
Starting point is 00:25:04 The problem with that modeling, once you get a little bit more business sophistication than I had the first time I made the observation, is that you can't sit down with a CISO at a company that just suffered a data breach
Starting point is 00:25:17 and have your conversation be, doesn't it suck to be you? Dun, dun, because you messed up. That's it. You need that dog and pony show of being able to go in depth and nuance because otherwise you're basically calling out your customer,
Starting point is 00:25:31 which you can't really do, which I feel occludes a lot of clarity for folks who are not in that position who want to understand these things a bit better. I think you're right, Corey. I think definitely, I don't want to be in a place where we're definitely just educating people on this.
Starting point is 00:25:45 But I also want to call out that we are in a world where it is true that Amazon, Azure, Google Cloud, they all have vulnerabilities as well. Thanks to research by all these amazing people on the internet from different companies out there, they've identified that, hey, these are not pristine environments that you can go into. Azure, AWS, Google Cloud, they themselves have vulnerabilities. And sometimes some of those
Starting point is 00:26:12 vulnerabilities cannot be fixed until the customer intervenes and upgrades their services. We do live in a world where there's not enough education about this as well. So I'm glad you brought this up. Because for people who are listening in, I mean, I was one of those people who would always say, when was the last time you heard Amazon had a breach or Microsoft had a breach or Google Cloud had a breach? That was the idea when people were just buying into the concept of cloud and did not trust cloud.
Starting point is 00:26:40 Every cybersecurity person that I would talk to, they're like, why would you trust cloud? It doesn't make sense. But this is like seven, eight years ago. Fast forward to today, it's almost default. Why would you not go into cloud? So for people who tend to forget that part, I guess there is definitely a journey
Starting point is 00:26:56 that people came through. With the same example of multi-factor authentication, it was never a, hey, let's enable password and multi-factor authentication. It took a few stages to get there. Same with this as well. We're at that stage where now cloud service providers are showing their kinks in their armor. And now people are questioning, I should update my risk matrix for what is actually a breach in AWS.
Starting point is 00:27:22 Capital One is a great example where the Amazon employee who was sentenced cheated of something which is never even thought of before, opened up the door for that. Uber CISO being potentially sentenced, there was another one. Because we became more primetime news, now people are starting to understand, oh, wait, this is not the same as what it used to be. Cloud security breaches have evolved as well. And just sticking to understand, oh, wait, this is not the same as it used to be. Cloud security breaches have evolved as well. And just sticking to the Uber point, when Uber had that recent breach where they were talking about, hey, so many data records were gone, what a lot of people did not talk about in that same message, it also mentioned the fact that they also got access to the AWS
Starting point is 00:28:00 console of Uber. Now, that to me is my risk matrix has already gone higher than what it was before because it's just not your data, but potentially your production, your pre-prod, any development work that you were doing for,
Starting point is 00:28:13 I don't know, self-driving cars or whatever that Uber and things is doing. All that is out on the internet. But who was talking about all of that? That's a much worse breach than what was portrayed on the internet.
Starting point is 00:28:24 I don't know. What do you think? When it comes to trusting providers, where I sit is that I think, given their scale, they need to be a lot more transparent than they have been historically. However, I also believe that if you do not trust that these companies are telling you the truth about what they're doing, how they're doing it, what their controls are, then you should not be using them as a customer, full stop. This idea of confidential computing drives me nuts because so much of it is, well, what if we assume our cloud provider is lying to us about all of these things?
Starting point is 00:28:58 Hypothetically, there's nothing stopping them from building an exact clone of their entire control plane that they redirect your request to that do something completely different under the hood. Oh yeah, of course we're encrypting it with that special KMS key. No, they're not. Or yeah, sure, we're going to put that into this region. Nope, it goes right back to Virginia. If you believe that's what's going on and that they're willing to do that, you can't be in cloud. Yeah, 100%. I think foundational trust needs to exist. And I don't think the cloud service providers themselves do a great job of building that trust. And maybe that's where the drift comes in because the business has decided they're going to cloud. The cybersecurity people are trying to be more aware and asking the question, hey, why do we trust this so blindly? I don't have a pen test report from
Starting point is 00:29:50 Amazon saying they have tested service. Yes, I do have a certificate saying it's PCI compliant, but how do I know to what you said they haven't cloned our services? Fortunately, businesses are getting smarter. Like Walmart would never have their resources in AWS because they don't trust them. It's a business risk. And suddenly they decided to go into that space. But the other way around, Microsoft decides tomorrow
Starting point is 00:30:13 that they want to start their own Walmart. Then what do you do? So I don't know how many people actually consider that as a real business risk, especially because there's a word that was floating around the internet called super cloud. And the idea behind this was, oh, I can already see your reaction. Yeah, don't get me started on that whole mess.
Starting point is 00:30:38 Oh, no, I'm the same. I'm like, what? What now? So one thing I took away, which I thought was still valuable was the fact that if you look at the cloud service providers, they're all like octopus. They all have tentacles everywhere. Like if you look at the cloud service providers, they're all like octopus. They all have tentacles everywhere. Like if you look at the Amazon of the world, they're not only a bookstore, they have a grocery store, they have delivery service. So they are into a lot of industries. The same way Google Cloud, Microsoft, they're all in multiple industries. And they can still have enough money to choose and to go into an industry that they have never been into before because of the access that they would get with all this information that they have
Starting point is 00:31:09 potentially assuming they take the information now shared responsibility quote-unquote they should not do it but there's nothing stopping them from actually starting a walmart tomorrow if they want you to so because a podcast and a day job aren't enough, what are you going to be doing in the near future, given that as we record this, reInvent is nigh? Yeah, so podcasting and being in the YouTube space has definitely opened up the creative mindset for me and I think for my producer as well. We're doing all these exciting projects. We have something called Cloud Security Villains that is coming up for AWS reInvent and it's going to be
Starting point is 00:31:50 released on our YouTube channel as well as on our social media and we'll have merchandise for it across the reInvent as well. I'm just super excited about the possibility that media as a space provides for everyone. So for people who are listening in and thinking that,
Starting point is 00:32:05 I don't know, I don't want to write for a blog or email newsletter or whatever the thing may be, I just want to put it out there that I used to be excited about AWS reInvent just to understand, hey, hopefully they will release a new security service. Now I get excited about these events because I get to meet community,
Starting point is 00:32:22 help them share what they have learned on the internet and sound smarter as a result of that as well and get interviewed by people like yourself. But I definitely find that at the moment with AWS Greenwind coming in, a couple of things that are exciting for me is the release of the Cloud Security Balance, which I think would
Starting point is 00:32:40 be an exciting project, especially hint-hint for people who are into comic books. You would definitely enjoy it and I think your kids would as well. So just in time for Christmas. We will definitely keep our eye out for that and put a link to that in the show notes. I really want to thank you for being so generous with your time.
Starting point is 00:32:57 If people want to learn more about what you're up to, where's the best place for them to find you? I think I'm fortunate enough to be at that stage where normally if people Google me and just simply Ashish Rajan, they will definitely find me. It'll be really hard for them to not find me on the internet. But if you are looking for a source of unbiased cloud security knowledge, you can definitely hit up cloudsecuritypodcast.tv or our YouTube and LinkedIn channel. We go live stream every week with a new guest talking about Flart Security,
Starting point is 00:33:29 which could be companies like LinkedIn, Twilio, to name a few that have come on this show already and a lot more that have come in and been generous with their time and shared how they do, what they do. And we're fortunate that we get ranked top 100 in America, US, UK, as well as Australia. I'm really fortunate for that. So we're doing something right. So hopefully you get some value out of it as well when you kind of come and find me. And we will, of course, put links to all of that in the show notes. Thank you so much for being so generous with your time.
Starting point is 00:33:59 I really appreciate it. Thank you, Corey, for having me. I really appreciate this as well. I enjoyed the conversation. As did I. Ashish Rajan, Principal Cloud Security Advocate at Snyk, who is sponsoring this promoted guest episode. I'm cloud economist Corey Quinn, and this is Screaming in the Cloud. If you enjoyed this podcast, please leave a five-star review on your podcast platform of choice. Whereas if you've hated this podcast, please leave a five-star review on your podcast platform of choice. Whereas if you've hated this podcast, please leave a five
Starting point is 00:34:25 star review on your podcast platform of choice, along with an insulting comment pointing out that not every CISO gets fired. Some of them successfully managed to blame the intern. If your AWS bill keeps rising and your blood pressure is doing the same, then you need the Duck Bill Group. We help companies fix their AWS bill by making it smaller and less horrifying. The Duck Bill Group works for you, not AWS. We tailor recommendations to your business and we get to the point. Visit duckbillgroup.com to get started. This has been a HumblePod production.
Starting point is 00:35:24 Stay humble.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.