Episode 77 — Secure Cloud Networking: Security Groups, NACLs, Routing, and Exposure Mistakes

This episode explains cloud networking controls as the mechanisms that define reachability and segmentation, and it aligns with GSEC because exam questions often describe an exposure problem that is really a routing or rule-scope issue. You’ll compare security groups and network ACLs as layered controls with different behaviors, then connect them to routing tables, gateways, and peering paths that can unintentionally create broad connectivity. We’ll use scenarios like a database reachable from the internet due to a wide inbound rule, a management service exposed through a public subnet, and an internal-only workload accidentally routed through an internet gateway because of a misapplied route. Best practices include default-deny inbound posture, tight source scoping, separation of public and private subnets, controlled egress, and continuous validation against intended architecture, including automated checks that flag new exposures. Troubleshooting focuses on isolating whether a failure is rule-based or route-based, identifying asymmetric paths that break stateful inspection, and resolving connectivity needs without expanding trust boundaries beyond what the workload actually requires. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 77 — Secure Cloud Networking: Security Groups, NACLs, Routing, and Exposure Mistakes
Broadcast by