Identity is the New OS: Rethinking Security Boundaries in the Cloud
In traditional infrastructure, the operating system was the security boundary.
A geeky blog about technical things
In traditional infrastructure, the operating system was the security boundary.
Continuing my previous post about cloud storage monitoring, I'm back with the "Azure edition" today. I'll skip the preamble about why this is important and get straight to the commands this time (but stay tuned about some additional considerations that are relevant to both AWS a…