Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 Battle Camp S1: Reality Rivalries with Dana Moon & QT 1:00:36
Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough
Manage episode 444419296 series 3516169
In this episode of The Security Repo Podcast, we take a look at how to do secrets rotation in a highly available systems reliably.
We are joined by Kenton McDonough. Kent got his MS in Computer Science from Virginia Tech in 2021 with a focus on systems and networking. He currently does security automation for Viasat Inc, a global Satellite internet service provider, with an emphasis on credential management and RBAC systems.
We walk through the tech stack that Kent works with, which includes a little of everything. We revisit his talk topic at BSides as Vegas 2024 with a discussion of 'blue/green' secrets rotation. By the end, we uncover some best practices to keep in mind when architecting a scalable, highly available application with regard to secrets management.
Links shared in the episode:
kent07[at]bt.edu
"Zero downtime credential rotation" at BSides Las Vegas 2024
https://www.youtube.com/live/b22uT4pYpk8?feature=shared&t=17092
93 episodes
Manage episode 444419296 series 3516169
In this episode of The Security Repo Podcast, we take a look at how to do secrets rotation in a highly available systems reliably.
We are joined by Kenton McDonough. Kent got his MS in Computer Science from Virginia Tech in 2021 with a focus on systems and networking. He currently does security automation for Viasat Inc, a global Satellite internet service provider, with an emphasis on credential management and RBAC systems.
We walk through the tech stack that Kent works with, which includes a little of everything. We revisit his talk topic at BSides as Vegas 2024 with a discussion of 'blue/green' secrets rotation. By the end, we uncover some best practices to keep in mind when architecting a scalable, highly available application with regard to secrets management.
Links shared in the episode:
kent07[at]bt.edu
"Zero downtime credential rotation" at BSides Las Vegas 2024
https://www.youtube.com/live/b22uT4pYpk8?feature=shared&t=17092
93 episodes
All episodes
×
1 Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak 21:05

1 Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci 23:04

1 From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski 20:03

1 Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko 23:06

1 Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson 24:19

1 How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen 22:20

1 Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz 22:53

1 The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill 22:36

1 Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel 22:15

1 Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen 22:45

1 Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin 41:51

1 What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher 42:21

1 Understanding Security Champions and Making Human Connections - Dustin Lehr 48:29

1 Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett 37:54

1 Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee 30:59

1 The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore 36:39

1 Securing Workload Identities And Working On Conjure - Jody Hunt 43:31

1 The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan 42:37

1 Securing Flight Simulators And Other Operational Technology - Coburn Slay 45:02

1 Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison 36:03

1 Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley 37:37

1 Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer 41:39

1 Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker 33:14

1 Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer 33:58

1 Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez 27:13

1 STIR/SHAKEN and Password Policies- Per Thorsheim 34:14

1 Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne 31:05

1 From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock 44:36

1 Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough 35:29

1 Countering Shadow IT Through Nudging Intervention - Garret Gross 28:35
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.