
Sign up to save your podcasts
Or


This episode breaks down how to combine identity controls (IAM, IRSA), network telemetry (VPC Flow Logs, DNS), and deep runtime visibility (process behavior, containers, Lambda execution) to detect and contain threats in real time. It also explores practical AWS-native approaches using services like GuardDuty, CloudTrail, Security Hub, EventBridge, and Step Functions to move from reactive monitoring to automated, intelligence-driven response.
A must-listen for architects and CISOs looking to reduce blast radius, improve detection fidelity, and build truly resilient, cloud-native security operations.
By PradeepThis episode breaks down how to combine identity controls (IAM, IRSA), network telemetry (VPC Flow Logs, DNS), and deep runtime visibility (process behavior, containers, Lambda execution) to detect and contain threats in real time. It also explores practical AWS-native approaches using services like GuardDuty, CloudTrail, Security Hub, EventBridge, and Step Functions to move from reactive monitoring to automated, intelligence-driven response.
A must-listen for architects and CISOs looking to reduce blast radius, improve detection fidelity, and build truly resilient, cloud-native security operations.