Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Emerging Threats Against Cloud Application Identities and What You Should Do About It
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 About Sarah Young
- 3 What is an application identity
- 4 Principle of least privilege
- 5 Service to service
- 6 Nonhuman identity
- 7 Statistics
- 8 Solargate
- 9 Consent phishing
- 10 GitHub keys
- 11 Main threats
- 12 Phishing emails
- 13 Leaked credentials
- 14 Sign in logs
- 15 Audit logs
- 16 Leaked creds
- 17 What to do
- 18 Containment
- 19 Remediation
- 20 Proactive use
- 21 Summary
- 22 Permissions
- 23 Demo