Episode 78 — Secure Cloud Storage: Buckets, Shares, Encryption Defaults, and Data Leaks

This episode teaches cloud storage security as a combination of access control, configuration hygiene, and lifecycle management, which is relevant to GSEC because many real-world leaks and many exam scenarios come from overly permissive storage settings. You’ll define common storage patterns like object storage buckets and shared file services, then connect access policies, public exposure flags, and cross-account permissions to the ways data becomes unintentionally accessible. We’ll examine encryption defaults and what they do and do not solve, emphasizing that encryption does not protect you from an authorized-but-overbroad identity reading everything. Scenarios include a bucket made public for “temporary testing,” a shared storage policy that allows wildcard read, and a situation where sensitive backups are stored without retention controls and become an exfiltration target. Best practices include strict public access blocking, least privilege policies, separate accounts or projects for sensitive data, logging for access and changes, and automated detection for new public exposures and anomalous access patterns. Troubleshooting includes validating whether access is failing due to policy, role assumption, or encryption key permissions, and ensuring you can prove what was accessed through logs before rotating keys or changing policies in ways that destroy evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 78 — Secure Cloud Storage: Buckets, Shares, Encryption Defaults, and Data Leaks
Broadcast by