Cloud

GCP Org Policies to Live By - And Their Implementation Pitfalls

Org Policy Constraints are essential for building guardrails in GCP. Learn how to mitigate dangerous defaults, enforce approved patterns, and implement safeguards. But wait, its not all bubblegum and butterflies in preventative-controls land. Discover the challenges of implementing these constraints, such as hidden dependencies, bypasses and the introduction of friction. Fresh off her below-average scored RSAC talk, Kat will attempt to bring the real-life pain of preventative controls for enterprise-scale cloud deployments to life with quick wit, crowd work and the desperate usage of finger puppets for cheap laughs.

Kat Traxler

Kat Traxler

Kat Traxler is the Principal Security Researcher at Vectra AI, focusing on abuse techniques and vulnerabilities in the public cloud. Additionally she has worked at various stages in the SDLC, performing web application penetration testing and security architecture.

Kat’s research philosophy directs her work to where design flaws and misconfigurations are most probable. This guiding principle leads her research to the intersection of technologies, particularly the convergence of cloud security and application security, and where the OS layer interfaces with higher-level abstractions. She can be found on the internet as @nightmareJS.

Cloud

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

GCP Org Policies to Live By - And Their Implementation Pitfalls

Org Policy Constraints are essential for building guardrails in GCP. Learn how to mitigate dangerous defaults, enforce approved patterns, and implement safeguards. But wait, its not all bubblegum and butterflies in preventative-controls land. Discover the challenges of implementing these constraints, such as hidden dependencies, bypasses and the introduction of friction. Fresh off her below-average scored RSAC talk, Kat will attempt to bring the real-life pain of preventative controls for enterprise-scale cloud deployments to life with quick wit, crowd work and the desperate usage of finger puppets for cheap laughs.

You'll wish you went sooner!

We proudly present SecretCon, an entirely unparalleled conference for the state of Minnesota, built for our new digital reality. This conference is dedicated to the many specialties of our hacker, cybersecurity, and privacy community. We have taken it upon ourselves to construct a conference that not only embraces our past, but also looks to the future. Join us!