<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-the-giac-gpcs-audio-course" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified: The GIAC GPCS Audio Course</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-the-giac-gpcs-audio-course</itunes:new-feed-url>
    <description>The podcast delivers practical cloud security guidance for professionals who have to ship real systems on real timelines. Episodes focus on the moves that prevent costly incidents: reducing accidental exposure, tightening identity and permissions, hardening serverless triggers, securing managed platforms, and building durable defaults that survive updates and team changes. The approach is technical and operational, with clear explanations that translate directly into repeatable patterns.

Each topic is designed to help you think like both a defender and an architect: what attackers exploit first, where misconfigurations hide, and how to constrain blast radius without slowing delivery. If you want deeper reference material, a companion book expands the same concepts in a structured format, and a flash cards book supports fast review and retention for day-to-day work, interviews, and certification prep.</description>
    <copyright>2026 Bare Metal Cyber</copyright>
    <podcast:guid>e22138d1-f567-5f24-bec2-72e7ba690bfe</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="a7158aa6-9413-5ab4-bc40-e1944b3987d9" feedUrl="https://feeds.transistor.fm/certified-the-giac-gcld-audio-course"/>
      <podcast:remoteItem feedGuid="6b71639e-04bb-5242-a4af-377bc46b4eae" feedUrl="https://feeds.transistor.fm/certified-comptia-cloud"/>
      <podcast:remoteItem feedGuid="a0397309-9940-5e31-a4f8-b9c822b9212a" feedUrl="https://feeds.transistor.fm/framework-nist-800-53-audio-course-05bccba8-c74c-4b5e-a5eb-93af7b049a3b"/>
      <podcast:remoteItem feedGuid="3d181116-9f44-5698-bfe8-31035d41873c" feedUrl="https://feeds.transistor.fm/certified-azure-az-900-microsoft-azure-fundamentals"/>
      <podcast:remoteItem feedGuid="506cc512-6361-5285-8cdf-7de14a0f5a64" feedUrl="https://feeds.transistor.fm/certified-aws-certified-cloud-practitioner"/>
      <podcast:remoteItem feedGuid="c49aa2e8-58e4-500c-a099-75a61254f4a8" feedUrl="https://feeds.transistor.fm/certified-ccsp-45cbf1dc-9b01-46bc-834e-830acbcf637b"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="d305c2ab-c0a9-54fe-8bc1-e54c2649021e" feedUrl="https://feeds.transistor.fm/certified-the-comptia-cloudnetx-audio-course"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="dd19cb51-faa8-5990-873c-5a1b155835f4" feedUrl="https://feeds.transistor.fm/certified-google-cloud-digital-leader-audio-course"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <itunes:applepodcastsverify>f0d821b0-0ae9-11f1-8758-9988d77dd50d</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Tue, 10 Feb 2026 16:18:01 -0600" url="https://media.transistor.fm/3ed28c6e/027a66f9.mp3" length="611189" type="audio/mpeg">Welcome to Certified: The GIAC GPCS Audio Course</podcast:trailer>
    <language>en</language>
    <pubDate>Tue, 17 Mar 2026 17:23:31 -0500</pubDate>
    <lastBuildDate>Sat, 04 Apr 2026 00:07:11 -0500</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/TVZJaEIxjixI5Qy_FW_52Xik3jj5RDsWjMTc5uRqn2o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNjRi/ZTkxMmIzOTJmODI3/ODAxNTI5NGUyMjc1/YjhkMS5wbmc.jpg</url>
      <title>Certified: The GIAC GPCS Audio Course</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>serial</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/TVZJaEIxjixI5Qy_FW_52Xik3jj5RDsWjMTc5uRqn2o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNjRi/ZTkxMmIzOTJmODI3/ODAxNTI5NGUyMjc1/YjhkMS5wbmc.jpg"/>
    <itunes:summary>The podcast delivers practical cloud security guidance for professionals who have to ship real systems on real timelines. Episodes focus on the moves that prevent costly incidents: reducing accidental exposure, tightening identity and permissions, hardening serverless triggers, securing managed platforms, and building durable defaults that survive updates and team changes. The approach is technical and operational, with clear explanations that translate directly into repeatable patterns.

Each topic is designed to help you think like both a defender and an architect: what attackers exploit first, where misconfigurations hide, and how to constrain blast radius without slowing delivery. If you want deeper reference material, a companion book expands the same concepts in a structured format, and a flash cards book supports fast review and retention for day-to-day work, interviews, and certification prep.</itunes:summary>
    <itunes:subtitle>The podcast delivers practical cloud security guidance for professionals who have to ship real systems on real timelines.</itunes:subtitle>
    <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 1 — Decode the GPCS exam format, timing, and scoring with calm precision </title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1 — Decode the GPCS exam format, timing, and scoring with calm precision </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dda1566a-2d1f-4a5e-a931-cad8d6968941</guid>
      <link>https://share.transistor.fm/s/3aac3eb3</link>
      <description>
        <![CDATA[<p>This episode explains how the GIAC GPCS exam is structured so you can plan your study and test-day execution like an engineering problem instead of a stress event. You’ll connect question style and pacing to how you build and use an index, how you decide when to move on, and how you avoid spending minutes “almost knowing” something. We’ll clarify what scoring means in practice, how to interpret confidence across domains, and how to set a personal time budget that includes lookup time without turning every question into a scavenger hunt. You’ll also walk through a simple approach for triaging questions into “answer now,” “verify quickly,” and “return later,” with a scenario where poor pacing causes avoidable errors even when your content knowledge is strong. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how the GIAC GPCS exam is structured so you can plan your study and test-day execution like an engineering problem instead of a stress event. You’ll connect question style and pacing to how you build and use an index, how you decide when to move on, and how you avoid spending minutes “almost knowing” something. We’ll clarify what scoring means in practice, how to interpret confidence across domains, and how to set a personal time budget that includes lookup time without turning every question into a scavenger hunt. You’ll also walk through a simple approach for triaging questions into “answer now,” “verify quickly,” and “return later,” with a scenario where poor pacing causes avoidable errors even when your content knowledge is strong. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:46:53 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3aac3eb3/e9e4603a.mp3" length="25507077" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>637</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how the GIAC GPCS exam is structured so you can plan your study and test-day execution like an engineering problem instead of a stress event. You’ll connect question style and pacing to how you build and use an index, how you decide when to move on, and how you avoid spending minutes “almost knowing” something. We’ll clarify what scoring means in practice, how to interpret confidence across domains, and how to set a personal time budget that includes lookup time without turning every question into a scavenger hunt. You’ll also walk through a simple approach for triaging questions into “answer now,” “verify quickly,” and “return later,” with a scenario where poor pacing causes avoidable errors even when your content knowledge is strong. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3aac3eb3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 2 — Master GIAC testing rules, open-book boundaries, and proctoring realities </title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2 — Master GIAC testing rules, open-book boundaries, and proctoring realities </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1f07e571-ac85-46cd-96b0-30f5ffbad248</guid>
      <link>https://share.transistor.fm/s/b2d80aa1</link>
      <description>
        <![CDATA[<p>This episode focuses on the operational rules that shape your risk on exam day, because a correct answer doesn’t help if you trigger a policy issue or lose time to preventable friction. You’ll define what “open book” really means for GIAC exams, how to keep reference materials usable without becoming a distraction, and what boundaries matter around notes, devices, and workspace setup. We’ll cover proctoring realities at a practical level: identity checks, environment expectations, and how to avoid behaviors that look suspicious even when your intent is harmless. You’ll also get a best-practice workflow for handling interruptions and technical hiccups so you preserve both compliance and calm, plus a scenario where an unprepared desk layout forces a last-minute scramble that burns confidence and minutes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the operational rules that shape your risk on exam day, because a correct answer doesn’t help if you trigger a policy issue or lose time to preventable friction. You’ll define what “open book” really means for GIAC exams, how to keep reference materials usable without becoming a distraction, and what boundaries matter around notes, devices, and workspace setup. We’ll cover proctoring realities at a practical level: identity checks, environment expectations, and how to avoid behaviors that look suspicious even when your intent is harmless. You’ll also get a best-practice workflow for handling interruptions and technical hiccups so you preserve both compliance and calm, plus a scenario where an unprepared desk layout forces a last-minute scramble that burns confidence and minutes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:48:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b2d80aa1/e50cc5a5.mp3" length="28688801" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>717</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the operational rules that shape your risk on exam day, because a correct answer doesn’t help if you trigger a policy issue or lose time to preventable friction. You’ll define what “open book” really means for GIAC exams, how to keep reference materials usable without becoming a distraction, and what boundaries matter around notes, devices, and workspace setup. We’ll cover proctoring realities at a practical level: identity checks, environment expectations, and how to avoid behaviors that look suspicious even when your intent is harmless. You’ll also get a best-practice workflow for handling interruptions and technical hiccups so you preserve both compliance and calm, plus a scenario where an unprepared desk layout forces a last-minute scramble that burns confidence and minutes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b2d80aa1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 3 — Map today’s public cloud landscape risks without vendor blind spots </title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3 — Map today’s public cloud landscape risks without vendor blind spots </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">09cd5129-fd68-482e-8c85-466d76989c1a</guid>
      <link>https://share.transistor.fm/s/de0614ef</link>
      <description>
        <![CDATA[<p>This episode builds a vendor-neutral threat and risk map for public cloud so you can answer exam questions that test principles, not brand trivia. You’ll frame the cloud as a set of shared control planes, identity systems, network abstractions, and managed services that shift failure modes compared to on-prem. We’ll define common risk categories—misconfiguration, identity over-permissioning, exposed management interfaces, weak logging, and insecure service-to-service trust—and tie each to concrete attacker outcomes like data access, persistence, and privilege escalation. You’ll work through a scenario where a team “moves fast” with default settings and later discovers that visibility and boundaries were never established, making incident response slower and audit evidence weaker. The goal is to recognize patterns that transfer across providers and to spot distractors that over-emphasize one platform’s terminology. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode builds a vendor-neutral threat and risk map for public cloud so you can answer exam questions that test principles, not brand trivia. You’ll frame the cloud as a set of shared control planes, identity systems, network abstractions, and managed services that shift failure modes compared to on-prem. We’ll define common risk categories—misconfiguration, identity over-permissioning, exposed management interfaces, weak logging, and insecure service-to-service trust—and tie each to concrete attacker outcomes like data access, persistence, and privilege escalation. You’ll work through a scenario where a team “moves fast” with default settings and later discovers that visibility and boundaries were never established, making incident response slower and audit evidence weaker. The goal is to recognize patterns that transfer across providers and to spot distractors that over-emphasize one platform’s terminology. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:49:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/de0614ef/64aa729a.mp3" length="31898716" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>797</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode builds a vendor-neutral threat and risk map for public cloud so you can answer exam questions that test principles, not brand trivia. You’ll frame the cloud as a set of shared control planes, identity systems, network abstractions, and managed services that shift failure modes compared to on-prem. We’ll define common risk categories—misconfiguration, identity over-permissioning, exposed management interfaces, weak logging, and insecure service-to-service trust—and tie each to concrete attacker outcomes like data access, persistence, and privilege escalation. You’ll work through a scenario where a team “moves fast” with default settings and later discovers that visibility and boundaries were never established, making incident response slower and audit evidence weaker. The goal is to recognize patterns that transfer across providers and to spot distractors that over-emphasize one platform’s terminology. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/de0614ef/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 4 — Compare AWS, Azure, and GCP security strengths and weak defaults </title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4 — Compare AWS, Azure, and GCP security strengths and weak defaults </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dca0d2b3-a07c-4153-b919-afa53671a1c8</guid>
      <link>https://share.transistor.fm/s/a789e0ac</link>
      <description>
        <![CDATA[<p>This episode compares the big three cloud providers through the lens the exam cares about: what each does well, what defaults can betray you, and how the same security objectives show up in different product shapes. You’ll translate core domains—identity, network controls, logging, key management, and storage security—into cross-cloud equivalencies so you can reason from first principles when a question uses unfamiliar naming. We’ll emphasize weak defaults and “foot-guns,” such as permissive access patterns, overly broad roles, and services that become reachable in ways teams didn’t intend. You’ll also learn a practical method for evaluating a service: identify its control plane, its data plane, its trust boundaries, and its logging hooks, then apply that method to a scenario where a managed service is deployed securely in one provider but insecurely in another due to unnoticed default behavior. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode compares the big three cloud providers through the lens the exam cares about: what each does well, what defaults can betray you, and how the same security objectives show up in different product shapes. You’ll translate core domains—identity, network controls, logging, key management, and storage security—into cross-cloud equivalencies so you can reason from first principles when a question uses unfamiliar naming. We’ll emphasize weak defaults and “foot-guns,” such as permissive access patterns, overly broad roles, and services that become reachable in ways teams didn’t intend. You’ll also learn a practical method for evaluating a service: identify its control plane, its data plane, its trust boundaries, and its logging hooks, then apply that method to a scenario where a managed service is deployed securely in one provider but insecurely in another due to unnoticed default behavior. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:49:42 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a789e0ac/d8db0f48.mp3" length="34788898" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>869</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode compares the big three cloud providers through the lens the exam cares about: what each does well, what defaults can betray you, and how the same security objectives show up in different product shapes. You’ll translate core domains—identity, network controls, logging, key management, and storage security—into cross-cloud equivalencies so you can reason from first principles when a question uses unfamiliar naming. We’ll emphasize weak defaults and “foot-guns,” such as permissive access patterns, overly broad roles, and services that become reachable in ways teams didn’t intend. You’ll also learn a practical method for evaluating a service: identify its control plane, its data plane, its trust boundaries, and its logging hooks, then apply that method to a scenario where a managed service is deployed securely in one provider but insecurely in another due to unnoticed default behavior. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a789e0ac/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 5 — Spot shared responsibility gaps that quietly create real cloud exposure </title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5 — Spot shared responsibility gaps that quietly create real cloud exposure </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9a7558c4-10f0-4d35-be54-0b29de10fded</guid>
      <link>https://share.transistor.fm/s/c0e80f5b</link>
      <description>
        <![CDATA[<p>This episode clarifies shared responsibility in the way that prevents real incidents: not as a slogan, but as a control ownership model you can apply to any service. You’ll define where the provider stops and where the customer must configure, monitor, and govern, then connect that split to exam questions that test “who is accountable for what.” We’ll cover common gaps, like assuming managed services are automatically secure, assuming encryption is automatic and complete, or assuming the provider monitors your identity abuse. You’ll practice mapping responsibilities across identity, network exposure, data protection, and detection engineering, using a scenario where a breach occurs because both parties assumed the other handled logging and alerting. The outcome is a reliable mental model for spotting responsibility traps in architectures and in multiple-choice distractors. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode clarifies shared responsibility in the way that prevents real incidents: not as a slogan, but as a control ownership model you can apply to any service. You’ll define where the provider stops and where the customer must configure, monitor, and govern, then connect that split to exam questions that test “who is accountable for what.” We’ll cover common gaps, like assuming managed services are automatically secure, assuming encryption is automatic and complete, or assuming the provider monitors your identity abuse. You’ll practice mapping responsibilities across identity, network exposure, data protection, and detection engineering, using a scenario where a breach occurs because both parties assumed the other handled logging and alerting. The outcome is a reliable mental model for spotting responsibility traps in architectures and in multiple-choice distractors. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:50:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c0e80f5b/8abe5a49.mp3" length="29496503" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>737</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode clarifies shared responsibility in the way that prevents real incidents: not as a slogan, but as a control ownership model you can apply to any service. You’ll define where the provider stops and where the customer must configure, monitor, and govern, then connect that split to exam questions that test “who is accountable for what.” We’ll cover common gaps, like assuming managed services are automatically secure, assuming encryption is automatic and complete, or assuming the provider monitors your identity abuse. You’ll practice mapping responsibilities across identity, network exposure, data protection, and detection engineering, using a scenario where a breach occurs because both parties assumed the other handled logging and alerting. The outcome is a reliable mental model for spotting responsibility traps in architectures and in multiple-choice distractors. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c0e80f5b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 6 — Understand instance metadata APIs and why attackers love them </title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6 — Understand instance metadata APIs and why attackers love them </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce9eee05-a5c6-4723-bb6d-1de06b613192</guid>
      <link>https://share.transistor.fm/s/3425574e</link>
      <description>
        <![CDATA[<p>This episode explains instance metadata services as a high-value target in cloud environments, because they can expose identity tokens, configuration data, and privileged context to workloads that should not have it. You’ll define what metadata APIs are, why they exist, and how applications and agents legitimately use them for bootstrapping and discovery. Then we pivot to attacker thinking: how server-side request forgery (SSRF), misrouted proxy traffic, or compromised workloads can query metadata endpoints to harvest credentials or discover paths to escalate. We’ll tie these mechanics to exam-relevant concepts like workload identity, temporary credentials, and trust boundaries, and walk through a scenario where a seemingly “minor” web flaw turns into account-wide access after metadata tokens are retrieved. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains instance metadata services as a high-value target in cloud environments, because they can expose identity tokens, configuration data, and privileged context to workloads that should not have it. You’ll define what metadata APIs are, why they exist, and how applications and agents legitimately use them for bootstrapping and discovery. Then we pivot to attacker thinking: how server-side request forgery (SSRF), misrouted proxy traffic, or compromised workloads can query metadata endpoints to harvest credentials or discover paths to escalate. We’ll tie these mechanics to exam-relevant concepts like workload identity, temporary credentials, and trust boundaries, and walk through a scenario where a seemingly “minor” web flaw turns into account-wide access after metadata tokens are retrieved. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:50:31 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3425574e/2380f4d9.mp3" length="29288549" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>732</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains instance metadata services as a high-value target in cloud environments, because they can expose identity tokens, configuration data, and privileged context to workloads that should not have it. You’ll define what metadata APIs are, why they exist, and how applications and agents legitimately use them for bootstrapping and discovery. Then we pivot to attacker thinking: how server-side request forgery (SSRF), misrouted proxy traffic, or compromised workloads can query metadata endpoints to harvest credentials or discover paths to escalate. We’ll tie these mechanics to exam-relevant concepts like workload identity, temporary credentials, and trust boundaries, and walk through a scenario where a seemingly “minor” web flaw turns into account-wide access after metadata tokens are retrieved. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3425574e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 7 — Assess metadata service hardening to block credential harvesting paths</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7 — Assess metadata service hardening to block credential harvesting paths</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2fa2508f-0e0e-4ee5-ac8f-9f2fa3e34abf</guid>
      <link>https://share.transistor.fm/s/d9b8de03</link>
      <description>
        <![CDATA[<p>This episode focuses on practical defenses for metadata attacks, emphasizing how to evaluate whether hardening is real or merely assumed. You’ll connect hardening controls to the attack paths from the prior episode, including SSRF-to-metadata, compromised host-to-metadata, and misconfigured routing that unintentionally exposes metadata. We’ll cover design choices such as requiring stronger request characteristics, restricting which processes or network paths can reach metadata, and limiting the data returned so a single query cannot yield powerful credentials. You’ll also learn troubleshooting considerations: what breaks when you harden metadata, how to test that applications still function, and how to validate that tokens are not accidentally being logged or cached. A scenario walkthrough shows a team tightening metadata access, then confirming success by attempting the original exploitation chain in a controlled test. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on practical defenses for metadata attacks, emphasizing how to evaluate whether hardening is real or merely assumed. You’ll connect hardening controls to the attack paths from the prior episode, including SSRF-to-metadata, compromised host-to-metadata, and misconfigured routing that unintentionally exposes metadata. We’ll cover design choices such as requiring stronger request characteristics, restricting which processes or network paths can reach metadata, and limiting the data returned so a single query cannot yield powerful credentials. You’ll also learn troubleshooting considerations: what breaks when you harden metadata, how to test that applications still function, and how to validate that tokens are not accidentally being logged or cached. A scenario walkthrough shows a team tightening metadata access, then confirming success by attempting the original exploitation chain in a controlled test. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:50:55 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d9b8de03/32f7004b.mp3" length="29873708" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>746</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on practical defenses for metadata attacks, emphasizing how to evaluate whether hardening is real or merely assumed. You’ll connect hardening controls to the attack paths from the prior episode, including SSRF-to-metadata, compromised host-to-metadata, and misconfigured routing that unintentionally exposes metadata. We’ll cover design choices such as requiring stronger request characteristics, restricting which processes or network paths can reach metadata, and limiting the data returned so a single query cannot yield powerful credentials. You’ll also learn troubleshooting considerations: what breaks when you harden metadata, how to test that applications still function, and how to validate that tokens are not accidentally being logged or cached. A scenario walkthrough shows a team tightening metadata access, then confirming success by attempting the original exploitation chain in a controlled test. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d9b8de03/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 8 — Detect and prevent metadata-driven privilege escalation across cloud workloads </title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8 — Detect and prevent metadata-driven privilege escalation across cloud workloads </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">33a5564d-bba7-4123-8ac0-2a1a859632e9</guid>
      <link>https://share.transistor.fm/s/4f1abf44</link>
      <description>
        <![CDATA[<p>This episode ties metadata abuse to privilege escalation outcomes so you can reason through exam questions that ask, “How does this become account compromise?” You’ll define escalation in cloud terms: pivoting from a workload identity to broader permissions, expanding access through overly powerful roles, and using newly gained credentials to enumerate, modify, or exfiltrate resources. We’ll emphasize prevention through least privilege on workload roles, tight scoping to required resources, and limiting what any single token can do, so even a successful metadata query has a small blast radius. We’ll also cover detection: identifying unusual token use patterns, unexpected calls from workloads to control planes, and evidence in logs that suggests credential reuse outside normal paths. A scenario explores a compromised application that uses harvested credentials to access storage and key management APIs, and how layered controls can interrupt the chain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode ties metadata abuse to privilege escalation outcomes so you can reason through exam questions that ask, “How does this become account compromise?” You’ll define escalation in cloud terms: pivoting from a workload identity to broader permissions, expanding access through overly powerful roles, and using newly gained credentials to enumerate, modify, or exfiltrate resources. We’ll emphasize prevention through least privilege on workload roles, tight scoping to required resources, and limiting what any single token can do, so even a successful metadata query has a small blast radius. We’ll also cover detection: identifying unusual token use patterns, unexpected calls from workloads to control planes, and evidence in logs that suggests credential reuse outside normal paths. A scenario explores a compromised application that uses harvested credentials to access storage and key management APIs, and how layered controls can interrupt the chain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:51:25 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4f1abf44/6ecce114.mp3" length="31013709" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>775</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode ties metadata abuse to privilege escalation outcomes so you can reason through exam questions that ask, “How does this become account compromise?” You’ll define escalation in cloud terms: pivoting from a workload identity to broader permissions, expanding access through overly powerful roles, and using newly gained credentials to enumerate, modify, or exfiltrate resources. We’ll emphasize prevention through least privilege on workload roles, tight scoping to required resources, and limiting what any single token can do, so even a successful metadata query has a small blast radius. We’ll also cover detection: identifying unusual token use patterns, unexpected calls from workloads to control planes, and evidence in logs that suggests credential reuse outside normal paths. A scenario explores a compromised application that uses harvested credentials to access storage and key management APIs, and how layered controls can interrupt the chain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4f1abf44/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 9 — Build metadata-safe compute patterns that survive real attacker pressure </title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9 — Build metadata-safe compute patterns that survive real attacker pressure </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">706c7e61-9208-4a48-b6ee-67501ae4c4d2</guid>
      <link>https://share.transistor.fm/s/b7de4cea</link>
      <description>
        <![CDATA[<p>This episode shifts from point fixes to resilient patterns: how to design compute deployments that remain secure even when an application layer fails. You’ll learn what “metadata-safe” means as an architectural objective, then apply it to common compute models like virtual machines, containers, and managed runtimes. We’ll cover best practices such as isolating sensitive workloads, minimizing outbound trust, controlling egress paths, and designing identity so compute units receive only the narrowest possible permissions for the shortest possible time. We’ll also address operational realities: how autoscaling, images, and configuration management can reintroduce risk if metadata assumptions get baked into templates. A scenario walks through a production service with a known SSRF exposure and demonstrates how metadata-safe identity and network boundaries keep the impact contained, which is exactly the kind of “defense in depth” reasoning the exam rewards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode shifts from point fixes to resilient patterns: how to design compute deployments that remain secure even when an application layer fails. You’ll learn what “metadata-safe” means as an architectural objective, then apply it to common compute models like virtual machines, containers, and managed runtimes. We’ll cover best practices such as isolating sensitive workloads, minimizing outbound trust, controlling egress paths, and designing identity so compute units receive only the narrowest possible permissions for the shortest possible time. We’ll also address operational realities: how autoscaling, images, and configuration management can reintroduce risk if metadata assumptions get baked into templates. A scenario walks through a production service with a known SSRF exposure and demonstrates how metadata-safe identity and network boundaries keep the impact contained, which is exactly the kind of “defense in depth” reasoning the exam rewards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:51:51 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b7de4cea/7aabde7f.mp3" length="29022122" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>725</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode shifts from point fixes to resilient patterns: how to design compute deployments that remain secure even when an application layer fails. You’ll learn what “metadata-safe” means as an architectural objective, then apply it to common compute models like virtual machines, containers, and managed runtimes. We’ll cover best practices such as isolating sensitive workloads, minimizing outbound trust, controlling egress paths, and designing identity so compute units receive only the narrowest possible permissions for the shortest possible time. We’ll also address operational realities: how autoscaling, images, and configuration management can reintroduce risk if metadata assumptions get baked into templates. A scenario walks through a production service with a known SSRF exposure and demonstrates how metadata-safe identity and network boundaries keep the impact contained, which is exactly the kind of “defense in depth” reasoning the exam rewards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b7de4cea/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 10 — Identify credential exposure paths from workloads, images, and build pipelines </title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10 — Identify credential exposure paths from workloads, images, and build pipelines </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c527a13-5fd0-4f01-85a5-2d2b86571c6a</guid>
      <link>https://share.transistor.fm/s/3cfb486a</link>
      <description>
        <![CDATA[<p>This episode surveys how credentials leak in cloud-native delivery, because many real incidents start with “temporary” secrets that quietly became permanent. You’ll define common exposure paths across runtime workloads (environment variables, local files, debug endpoints), machine images (baked-in keys, leftover tokens, unsafe defaults), and build pipelines (logs, artifacts, mis-scoped CI permissions). We’ll connect these paths to exam concepts like secret management, least privilege, and secure automation, and show how attackers chain small mistakes into durable access. You’ll also learn practical checks: how to review pipeline output for secret echoes, how to scan images and templates for embedded credentials, and how to reduce blast radius when exposure is suspected. A scenario walks through a leaked token in build logs that enables unauthorized access, then outlines the containment and rotation steps that restore trust. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode surveys how credentials leak in cloud-native delivery, because many real incidents start with “temporary” secrets that quietly became permanent. You’ll define common exposure paths across runtime workloads (environment variables, local files, debug endpoints), machine images (baked-in keys, leftover tokens, unsafe defaults), and build pipelines (logs, artifacts, mis-scoped CI permissions). We’ll connect these paths to exam concepts like secret management, least privilege, and secure automation, and show how attackers chain small mistakes into durable access. You’ll also learn practical checks: how to review pipeline output for secret echoes, how to scan images and templates for embedded credentials, and how to reduce blast radius when exposure is suspected. A scenario walks through a leaked token in build logs that enables unauthorized access, then outlines the containment and rotation steps that restore trust. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:52:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3cfb486a/8803a3bf.mp3" length="32078463" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>801</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode surveys how credentials leak in cloud-native delivery, because many real incidents start with “temporary” secrets that quietly became permanent. You’ll define common exposure paths across runtime workloads (environment variables, local files, debug endpoints), machine images (baked-in keys, leftover tokens, unsafe defaults), and build pipelines (logs, artifacts, mis-scoped CI permissions). We’ll connect these paths to exam concepts like secret management, least privilege, and secure automation, and show how attackers chain small mistakes into durable access. You’ll also learn practical checks: how to review pipeline output for secret echoes, how to scan images and templates for embedded credentials, and how to reduce blast radius when exposure is suspected. A scenario walks through a leaked token in build logs that enables unauthorized access, then outlines the containment and rotation steps that restore trust. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3cfb486a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 11 — Define cloud IAM fundamentals with least privilege as a living system</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11 — Define cloud IAM fundamentals with least privilege as a living system</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3f221e6b-5075-4ee1-8ba1-2b455f8e3708</guid>
      <link>https://share.transistor.fm/s/b2574e3f</link>
      <description>
        <![CDATA[<p>This episode establishes the IAM concepts the GPCS exam expects you to apply across cloud providers: principals (users, groups, roles, service identities), authentication versus authorization, policies as explicit statements of allowed actions, and the difference between identity-based and resource-based controls. You’ll treat least privilege as a living system rather than a one-time configuration by learning how permissions drift happens through new services, emergency access, and copy-pasted templates. We’ll connect these ideas to exam questions that test permission intent, inheritance, and effective access, then walk through an example where a workload role only needs read access to a single storage bucket but is mistakenly granted broad listing and key-management permissions. You’ll leave with a repeatable approach: define the job, list required actions, scope to specific resources, and validate effective access with logs and targeted tests. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode establishes the IAM concepts the GPCS exam expects you to apply across cloud providers: principals (users, groups, roles, service identities), authentication versus authorization, policies as explicit statements of allowed actions, and the difference between identity-based and resource-based controls. You’ll treat least privilege as a living system rather than a one-time configuration by learning how permissions drift happens through new services, emergency access, and copy-pasted templates. We’ll connect these ideas to exam questions that test permission intent, inheritance, and effective access, then walk through an example where a workload role only needs read access to a single storage bucket but is mistakenly granted broad listing and key-management permissions. You’ll leave with a repeatable approach: define the job, list required actions, scope to specific resources, and validate effective access with logs and targeted tests. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:52:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b2574e3f/49679371.mp3" length="29105709" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>727</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode establishes the IAM concepts the GPCS exam expects you to apply across cloud providers: principals (users, groups, roles, service identities), authentication versus authorization, policies as explicit statements of allowed actions, and the difference between identity-based and resource-based controls. You’ll treat least privilege as a living system rather than a one-time configuration by learning how permissions drift happens through new services, emergency access, and copy-pasted templates. We’ll connect these ideas to exam questions that test permission intent, inheritance, and effective access, then walk through an example where a workload role only needs read access to a single storage bucket but is mistakenly granted broad listing and key-management permissions. You’ll leave with a repeatable approach: define the job, list required actions, scope to specific resources, and validate effective access with logs and targeted tests. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b2574e3f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 12 — Audit IAM policies for overreach, wildcard abuse, and accidental admin</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12 — Audit IAM policies for overreach, wildcard abuse, and accidental admin</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d3be42a7-5a2d-488c-8c41-e161f9075cce</guid>
      <link>https://share.transistor.fm/s/5789d9b0</link>
      <description>
        <![CDATA[<p>This episode focuses on how to read and audit IAM policy documents the way an attacker and an auditor would, because the exam commonly probes your ability to spot “looks fine” permissions that are actually dangerous. You’ll define policy components such as actions, resources, conditions, and effect, then learn why wildcard patterns are high risk: they widen the set of allowed operations, expand to newly introduced services, and often hide privilege escalation paths. We’ll cover common accidental-admin patterns like broad write permissions on identity services, permissions that allow role assumption into more powerful identities, and permissions that grant the ability to attach or modify policies. A scenario walkthrough shows a team granting “temporary troubleshooting” access that quietly includes policy edit rights, enabling full takeover if credentials are compromised. You’ll also learn practical audit habits: search for wildcards, enumerate sensitive actions, check conditions, and validate effective permissions rather than trusting intent. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on how to read and audit IAM policy documents the way an attacker and an auditor would, because the exam commonly probes your ability to spot “looks fine” permissions that are actually dangerous. You’ll define policy components such as actions, resources, conditions, and effect, then learn why wildcard patterns are high risk: they widen the set of allowed operations, expand to newly introduced services, and often hide privilege escalation paths. We’ll cover common accidental-admin patterns like broad write permissions on identity services, permissions that allow role assumption into more powerful identities, and permissions that grant the ability to attach or modify policies. A scenario walkthrough shows a team granting “temporary troubleshooting” access that quietly includes policy edit rights, enabling full takeover if credentials are compromised. You’ll also learn practical audit habits: search for wildcards, enumerate sensitive actions, check conditions, and validate effective permissions rather than trusting intent. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:53:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5789d9b0/6c6eaf52.mp3" length="29794298" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>744</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on how to read and audit IAM policy documents the way an attacker and an auditor would, because the exam commonly probes your ability to spot “looks fine” permissions that are actually dangerous. You’ll define policy components such as actions, resources, conditions, and effect, then learn why wildcard patterns are high risk: they widen the set of allowed operations, expand to newly introduced services, and often hide privilege escalation paths. We’ll cover common accidental-admin patterns like broad write permissions on identity services, permissions that allow role assumption into more powerful identities, and permissions that grant the ability to attach or modify policies. A scenario walkthrough shows a team granting “temporary troubleshooting” access that quietly includes policy edit rights, enabling full takeover if credentials are compromised. You’ll also learn practical audit habits: search for wildcards, enumerate sensitive actions, check conditions, and validate effective permissions rather than trusting intent. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5789d9b0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 13 — Design role separation that stops privilege creep without breaking delivery </title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13 — Design role separation that stops privilege creep without breaking delivery </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6071fb5-3b9d-424f-84b8-fba241a17a68</guid>
      <link>https://share.transistor.fm/s/82a87bce</link>
      <description>
        <![CDATA[<p>This episode teaches role separation as a design control that reduces both fraud risk and operational blast radius, and it shows up on the exam anytime duties, approvals, and “who can do what” are tested. You’ll define separation of duties, privileged access boundaries, and administrative tiers, then translate those concepts into cloud-native constructs like distinct roles for deployment, operations, security review, and break-glass access. We’ll discuss why privilege creep happens in real teams—shared accounts, “just add this permission,” and unclear ownership—and how to prevent it without slowing delivery by using narrowly scoped roles, time-bound elevation, and documented exception paths. A practical scenario compares two pipelines: one that uses a single powerful service identity for every environment, and one that uses environment-scoped roles with explicit promotion steps and minimal permissions per stage. The outcome is a blueprint you can apply to exam questions about governance and to real environments where reliability and security have to coexist. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches role separation as a design control that reduces both fraud risk and operational blast radius, and it shows up on the exam anytime duties, approvals, and “who can do what” are tested. You’ll define separation of duties, privileged access boundaries, and administrative tiers, then translate those concepts into cloud-native constructs like distinct roles for deployment, operations, security review, and break-glass access. We’ll discuss why privilege creep happens in real teams—shared accounts, “just add this permission,” and unclear ownership—and how to prevent it without slowing delivery by using narrowly scoped roles, time-bound elevation, and documented exception paths. A practical scenario compares two pipelines: one that uses a single powerful service identity for every environment, and one that uses environment-scoped roles with explicit promotion steps and minimal permissions per stage. The outcome is a blueprint you can apply to exam questions about governance and to real environments where reliability and security have to coexist. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:53:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/82a87bce/aa93aeac.mp3" length="28219649" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>705</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches role separation as a design control that reduces both fraud risk and operational blast radius, and it shows up on the exam anytime duties, approvals, and “who can do what” are tested. You’ll define separation of duties, privileged access boundaries, and administrative tiers, then translate those concepts into cloud-native constructs like distinct roles for deployment, operations, security review, and break-glass access. We’ll discuss why privilege creep happens in real teams—shared accounts, “just add this permission,” and unclear ownership—and how to prevent it without slowing delivery by using narrowly scoped roles, time-bound elevation, and documented exception paths. A practical scenario compares two pipelines: one that uses a single powerful service identity for every environment, and one that uses environment-scoped roles with explicit promotion steps and minimal permissions per stage. The outcome is a blueprint you can apply to exam questions about governance and to real environments where reliability and security have to coexist. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/82a87bce/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 14 — Validate identity boundaries across accounts, subscriptions, and projects </title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14 — Validate identity boundaries across accounts, subscriptions, and projects </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">482e161c-d245-44b5-93f8-c2a97b9fc29f</guid>
      <link>https://share.transistor.fm/s/337ed81a</link>
      <description>
        <![CDATA[<p>This episode explains why cloud identity boundaries matter and how they are commonly implemented using multiple accounts, subscriptions, or projects to separate environments, teams, and data sensitivity levels. You’ll define boundary goals—containment, billing separation, delegated administration, and audit clarity—then connect them to exam scenarios where a breach in one environment must not automatically compromise others. We’ll cover practical boundary validation: ensuring roles cannot cross into restricted environments, confirming that shared services do not become unintended bridges, and checking that federation and directory integrations don’t override isolation assumptions. A scenario shows a production account that is logically “separate” but still reachable because a central identity group is granted broad role assignment privileges across all environments. You’ll learn how to reason about effective access across boundary layers, including organizational policy, identity policy, and resource policy, and how to prove the boundary holds using targeted tests and logging evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why cloud identity boundaries matter and how they are commonly implemented using multiple accounts, subscriptions, or projects to separate environments, teams, and data sensitivity levels. You’ll define boundary goals—containment, billing separation, delegated administration, and audit clarity—then connect them to exam scenarios where a breach in one environment must not automatically compromise others. We’ll cover practical boundary validation: ensuring roles cannot cross into restricted environments, confirming that shared services do not become unintended bridges, and checking that federation and directory integrations don’t override isolation assumptions. A scenario shows a production account that is logically “separate” but still reachable because a central identity group is granted broad role assignment privileges across all environments. You’ll learn how to reason about effective access across boundary layers, including organizational policy, identity policy, and resource policy, and how to prove the boundary holds using targeted tests and logging evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:54:19 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/337ed81a/89bbf420.mp3" length="34112870" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>852</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why cloud identity boundaries matter and how they are commonly implemented using multiple accounts, subscriptions, or projects to separate environments, teams, and data sensitivity levels. You’ll define boundary goals—containment, billing separation, delegated administration, and audit clarity—then connect them to exam scenarios where a breach in one environment must not automatically compromise others. We’ll cover practical boundary validation: ensuring roles cannot cross into restricted environments, confirming that shared services do not become unintended bridges, and checking that federation and directory integrations don’t override isolation assumptions. A scenario shows a production account that is logically “separate” but still reachable because a central identity group is granted broad role assignment privileges across all environments. You’ll learn how to reason about effective access across boundary layers, including organizational policy, identity policy, and resource policy, and how to prove the boundary holds using targeted tests and logging evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/337ed81a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 15 — Enforce conditional access patterns that limit risk without killing usability </title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15 — Enforce conditional access patterns that limit risk without killing usability </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21bfdf8e-b791-4a85-bd11-6027967f5b58</guid>
      <link>https://share.transistor.fm/s/46f00416</link>
      <description>
        <![CDATA[<p>This episode covers conditional access as a control strategy for reducing identity risk by making access decisions depend on context, not just a password and a static role. You’ll define common condition signals relevant to cloud platforms—device posture, location anomalies, session age, authentication strength, network origin, and risk scores—then map them to exam-style questions about secure access design. We’ll discuss how conditions can be applied to human access and service access, and why overly strict rules cause workarounds that increase risk, such as shared accounts or disabling MFA for “critical” users. A scenario walks through a developer who must access a management console during an incident: the right conditional access design allows secure, time-limited entry with strong verification rather than broad permanent permissions. You’ll also learn troubleshooting considerations, including how misconfigured conditions lock out legitimate users, how to create controlled break-glass paths, and how to validate that conditions are actually enforced in the authentication logs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers conditional access as a control strategy for reducing identity risk by making access decisions depend on context, not just a password and a static role. You’ll define common condition signals relevant to cloud platforms—device posture, location anomalies, session age, authentication strength, network origin, and risk scores—then map them to exam-style questions about secure access design. We’ll discuss how conditions can be applied to human access and service access, and why overly strict rules cause workarounds that increase risk, such as shared accounts or disabling MFA for “critical” users. A scenario walks through a developer who must access a management console during an incident: the right conditional access design allows secure, time-limited entry with strong verification rather than broad permanent permissions. You’ll also learn troubleshooting considerations, including how misconfigured conditions lock out legitimate users, how to create controlled break-glass paths, and how to validate that conditions are actually enforced in the authentication logs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:54:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/46f00416/3ca47827.mp3" length="37352061" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>933</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers conditional access as a control strategy for reducing identity risk by making access decisions depend on context, not just a password and a static role. You’ll define common condition signals relevant to cloud platforms—device posture, location anomalies, session age, authentication strength, network origin, and risk scores—then map them to exam-style questions about secure access design. We’ll discuss how conditions can be applied to human access and service access, and why overly strict rules cause workarounds that increase risk, such as shared accounts or disabling MFA for “critical” users. A scenario walks through a developer who must access a management console during an incident: the right conditional access design allows secure, time-limited entry with strong verification rather than broad permanent permissions. You’ll also learn troubleshooting considerations, including how misconfigured conditions lock out legitimate users, how to create controlled break-glass paths, and how to validate that conditions are actually enforced in the authentication logs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/46f00416/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 16 — Reduce permission blast radius with scoped roles and resource segmentation </title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16 — Reduce permission blast radius with scoped roles and resource segmentation </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">20d32f93-3a60-47e2-886a-0c7bed3134aa</guid>
      <link>https://share.transistor.fm/s/dad6396d</link>
      <description>
        <![CDATA[<p>This episode ties least privilege to blast-radius reduction by showing how role scope and resource segmentation work together to limit what any single identity can affect. You’ll define scope as the boundary where permissions apply, and segmentation as the way resources are grouped so controls can be applied cleanly—by environment, application, data classification, or business unit. We’ll connect these concepts to exam questions that ask you to choose the “best” control when an identity must perform a task but should not gain broad influence across unrelated resources. A scenario demonstrates a service identity that needs to write logs for one application; without segmentation it is given permissions that allow modification of shared network components, but with segmentation it is limited to a narrow resource group or project. You’ll also learn real-world pitfalls, like overly generic resource group design, inherited permissions that bypass segmentation intent, and missing tagging standards that make scoping hard to maintain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode ties least privilege to blast-radius reduction by showing how role scope and resource segmentation work together to limit what any single identity can affect. You’ll define scope as the boundary where permissions apply, and segmentation as the way resources are grouped so controls can be applied cleanly—by environment, application, data classification, or business unit. We’ll connect these concepts to exam questions that ask you to choose the “best” control when an identity must perform a task but should not gain broad influence across unrelated resources. A scenario demonstrates a service identity that needs to write logs for one application; without segmentation it is given permissions that allow modification of shared network components, but with segmentation it is limited to a narrow resource group or project. You’ll also learn real-world pitfalls, like overly generic resource group design, inherited permissions that bypass segmentation intent, and missing tagging standards that make scoping hard to maintain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:55:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dad6396d/549b9eed.mp3" length="39361394" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>983</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode ties least privilege to blast-radius reduction by showing how role scope and resource segmentation work together to limit what any single identity can affect. You’ll define scope as the boundary where permissions apply, and segmentation as the way resources are grouped so controls can be applied cleanly—by environment, application, data classification, or business unit. We’ll connect these concepts to exam questions that ask you to choose the “best” control when an identity must perform a task but should not gain broad influence across unrelated resources. A scenario demonstrates a service identity that needs to write logs for one application; without segmentation it is given permissions that allow modification of shared network components, but with segmentation it is limited to a narrow resource group or project. You’ll also learn real-world pitfalls, like overly generic resource group design, inherited permissions that bypass segmentation intent, and missing tagging standards that make scoping hard to maintain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dad6396d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 17 — Review and recall: cloud landscape, metadata, and IAM essentials together </title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17 — Review and recall: cloud landscape, metadata, and IAM essentials together </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a34e3695-ee96-4c79-808b-57e40eda2ae3</guid>
      <link>https://share.transistor.fm/s/9a210bec</link>
      <description>
        <![CDATA[<p>This episode consolidates the foundational domains you’ve covered—cloud risk patterns, shared responsibility, instance metadata exposure, and IAM design—into one integrated mental model that matches how GPCS questions often blend topics. You’ll revisit key definitions and, more importantly, practice linking them: how a cloud misconfiguration becomes exploitable, how a workload compromise can reach metadata, how harvested credentials translate into effective permissions, and how boundary design contains or amplifies impact. We’ll walk through a multi-step scenario where a web application flaw enables SSRF, SSRF reaches metadata, metadata yields a token, and that token’s permissions determine whether the incident is contained to one resource or becomes account-wide compromise. Along the way, you’ll identify the control points the exam expects you to recognize, such as token scope, role separation, resource segmentation, and logging evidence that proves what happened. The goal is to strengthen fast pattern recognition so you can eliminate distractors and choose the best defensive action under time pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode consolidates the foundational domains you’ve covered—cloud risk patterns, shared responsibility, instance metadata exposure, and IAM design—into one integrated mental model that matches how GPCS questions often blend topics. You’ll revisit key definitions and, more importantly, practice linking them: how a cloud misconfiguration becomes exploitable, how a workload compromise can reach metadata, how harvested credentials translate into effective permissions, and how boundary design contains or amplifies impact. We’ll walk through a multi-step scenario where a web application flaw enables SSRF, SSRF reaches metadata, metadata yields a token, and that token’s permissions determine whether the incident is contained to one resource or becomes account-wide compromise. Along the way, you’ll identify the control points the exam expects you to recognize, such as token scope, role separation, resource segmentation, and logging evidence that proves what happened. The goal is to strengthen fast pattern recognition so you can eliminate distractors and choose the best defensive action under time pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:55:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9a210bec/ac1ac5cc.mp3" length="34869376" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>871</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode consolidates the foundational domains you’ve covered—cloud risk patterns, shared responsibility, instance metadata exposure, and IAM design—into one integrated mental model that matches how GPCS questions often blend topics. You’ll revisit key definitions and, more importantly, practice linking them: how a cloud misconfiguration becomes exploitable, how a workload compromise can reach metadata, how harvested credentials translate into effective permissions, and how boundary design contains or amplifies impact. We’ll walk through a multi-step scenario where a web application flaw enables SSRF, SSRF reaches metadata, metadata yields a token, and that token’s permissions determine whether the incident is contained to one resource or becomes account-wide compromise. Along the way, you’ll identify the control points the exam expects you to recognize, such as token scope, role separation, resource segmentation, and logging evidence that proves what happened. The goal is to strengthen fast pattern recognition so you can eliminate distractors and choose the best defensive action under time pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9a210bec/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 18 — Secure long-term credentials with storage patterns that resist theft </title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18 — Secure long-term credentials with storage patterns that resist theft </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b7bb091-7472-4b5c-b051-da324e2b89e8</guid>
      <link>https://share.transistor.fm/s/bb10472c</link>
      <description>
        <![CDATA[<p>This episode explains why long-term credentials remain a persistent risk in cloud environments, even when teams prefer short-lived tokens, because legacy systems, vendor integrations, and human workflows still create durable secrets. You’ll define long-term credentials as secrets with extended validity—API keys, static access keys, and certain service account keys—and connect them to exam questions that test storage, protection, and misuse prevention. We’ll cover storage patterns that resist theft, such as dedicated secret storage systems, strong access controls around retrieval, encryption at rest with controlled key access, and minimizing secret exposure to applications and logs. A scenario shows a key accidentally committed to a repository and later discovered in a public leak, illustrating why secure storage must be paired with detection and rapid response. You’ll also learn operational considerations: who can read secrets, how secrets are injected into runtime safely, and how to validate that secrets are not duplicated across environments or embedded into images. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why long-term credentials remain a persistent risk in cloud environments, even when teams prefer short-lived tokens, because legacy systems, vendor integrations, and human workflows still create durable secrets. You’ll define long-term credentials as secrets with extended validity—API keys, static access keys, and certain service account keys—and connect them to exam questions that test storage, protection, and misuse prevention. We’ll cover storage patterns that resist theft, such as dedicated secret storage systems, strong access controls around retrieval, encryption at rest with controlled key access, and minimizing secret exposure to applications and logs. A scenario shows a key accidentally committed to a repository and later discovered in a public leak, illustrating why secure storage must be paired with detection and rapid response. You’ll also learn operational considerations: who can read secrets, how secrets are injected into runtime safely, and how to validate that secrets are not duplicated across environments or embedded into images. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:56:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bb10472c/4eb32546.mp3" length="33845366" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>846</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why long-term credentials remain a persistent risk in cloud environments, even when teams prefer short-lived tokens, because legacy systems, vendor integrations, and human workflows still create durable secrets. You’ll define long-term credentials as secrets with extended validity—API keys, static access keys, and certain service account keys—and connect them to exam questions that test storage, protection, and misuse prevention. We’ll cover storage patterns that resist theft, such as dedicated secret storage systems, strong access controls around retrieval, encryption at rest with controlled key access, and minimizing secret exposure to applications and logs. A scenario shows a key accidentally committed to a repository and later discovered in a public leak, illustrating why secure storage must be paired with detection and rapid response. You’ll also learn operational considerations: who can read secrets, how secrets are injected into runtime safely, and how to validate that secrets are not duplicated across environments or embedded into images. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bb10472c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 19 — Reduce secret sprawl by redesigning how humans and services authenticate </title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19 — Reduce secret sprawl by redesigning how humans and services authenticate </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9e7ec256-a5a9-4465-bc87-d4ed65883874</guid>
      <link>https://share.transistor.fm/s/84d05bd0</link>
      <description>
        <![CDATA[<p>This episode tackles secret sprawl as an architectural and governance problem: when credentials proliferate across scripts, teams, tools, and environments, you lose the ability to control, rotate, and investigate access reliably. You’ll define secret sprawl indicators—multiple copies of the same key, credentials shared by many users, secrets stored in wikis or tickets, and environment variables used as a permanent crutch—and connect them to exam objectives about secure authentication and access management. We’ll explore redesign strategies that replace shared secrets with stronger patterns, such as role-based access for humans, workload identities for services, and centralized authorization that limits where credentials must exist. A scenario compares two integrations: one that distributes a static key to every microservice and another that uses scoped identities per service, showing how the second design improves both security and incident response evidence. You’ll also learn troubleshooting considerations, including how to migrate without downtime, how to avoid breaking automation, and how to measure progress by counting and eliminating credential copies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode tackles secret sprawl as an architectural and governance problem: when credentials proliferate across scripts, teams, tools, and environments, you lose the ability to control, rotate, and investigate access reliably. You’ll define secret sprawl indicators—multiple copies of the same key, credentials shared by many users, secrets stored in wikis or tickets, and environment variables used as a permanent crutch—and connect them to exam objectives about secure authentication and access management. We’ll explore redesign strategies that replace shared secrets with stronger patterns, such as role-based access for humans, workload identities for services, and centralized authorization that limits where credentials must exist. A scenario compares two integrations: one that distributes a static key to every microservice and another that uses scoped identities per service, showing how the second design improves both security and incident response evidence. You’ll also learn troubleshooting considerations, including how to migrate without downtime, how to avoid breaking automation, and how to measure progress by counting and eliminating credential copies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:56:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/84d05bd0/eade2a78.mp3" length="34512019" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>862</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode tackles secret sprawl as an architectural and governance problem: when credentials proliferate across scripts, teams, tools, and environments, you lose the ability to control, rotate, and investigate access reliably. You’ll define secret sprawl indicators—multiple copies of the same key, credentials shared by many users, secrets stored in wikis or tickets, and environment variables used as a permanent crutch—and connect them to exam objectives about secure authentication and access management. We’ll explore redesign strategies that replace shared secrets with stronger patterns, such as role-based access for humans, workload identities for services, and centralized authorization that limits where credentials must exist. A scenario compares two integrations: one that distributes a static key to every microservice and another that uses scoped identities per service, showing how the second design improves both security and incident response evidence. You’ll also learn troubleshooting considerations, including how to migrate without downtime, how to avoid breaking automation, and how to measure progress by counting and eliminating credential copies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/84d05bd0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 20 — Operationalize credential rotation and revocation without fragile handwork </title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20 — Operationalize credential rotation and revocation without fragile handwork </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1ae96211-1e8f-445e-ab60-1a382f752eee</guid>
      <link>https://share.transistor.fm/s/86183953</link>
      <description>
        <![CDATA[<p>This episode focuses on turning credential hygiene into an operational capability, because the exam expects you to know not just that rotation is good, but how to execute rotation and revocation predictably under real constraints. You’ll define rotation as replacing a credential on a schedule or after risk events, and revocation as invalidating access quickly when compromise is suspected, then connect both to incident response timelines and audit expectations. We’ll cover practical rotation mechanics such as dual-credential cutovers, phased deployments, and dependency discovery so you don’t break services when keys change. A scenario walks through a suspected credential leak where rapid revocation is required, highlighting the difference between “we can rotate eventually” and “we can revoke now and recover safely.” You’ll also address failure modes: hidden dependencies, manual steps that get skipped, and lack of monitoring to confirm that old credentials truly stopped working, which are exactly the gaps that lead to repeatable compromise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on turning credential hygiene into an operational capability, because the exam expects you to know not just that rotation is good, but how to execute rotation and revocation predictably under real constraints. You’ll define rotation as replacing a credential on a schedule or after risk events, and revocation as invalidating access quickly when compromise is suspected, then connect both to incident response timelines and audit expectations. We’ll cover practical rotation mechanics such as dual-credential cutovers, phased deployments, and dependency discovery so you don’t break services when keys change. A scenario walks through a suspected credential leak where rapid revocation is required, highlighting the difference between “we can rotate eventually” and “we can revoke now and recover safely.” You’ll also address failure modes: hidden dependencies, manual steps that get skipped, and lack of monitoring to confirm that old credentials truly stopped working, which are exactly the gaps that lead to repeatable compromise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:57:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/86183953/f66acf52.mp3" length="32627027" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>815</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on turning credential hygiene into an operational capability, because the exam expects you to know not just that rotation is good, but how to execute rotation and revocation predictably under real constraints. You’ll define rotation as replacing a credential on a schedule or after risk events, and revocation as invalidating access quickly when compromise is suspected, then connect both to incident response timelines and audit expectations. We’ll cover practical rotation mechanics such as dual-credential cutovers, phased deployments, and dependency discovery so you don’t break services when keys change. A scenario walks through a suspected credential leak where rapid revocation is required, highlighting the difference between “we can rotate eventually” and “we can revoke now and recover safely.” You’ll also address failure modes: hidden dependencies, manual steps that get skipped, and lack of monitoring to confirm that old credentials truly stopped working, which are exactly the gaps that lead to repeatable compromise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/86183953/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 21 — Protect automation credentials with short-lived access patterns and guardrails </title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21 — Protect automation credentials with short-lived access patterns and guardrails </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cdf8d824-4fd7-4395-b126-290d23332a9e</guid>
      <link>https://share.transistor.fm/s/476ce5ed</link>
      <description>
        <![CDATA[<p>This episode explains how automation identities in CI/CD, infrastructure-as-code, and scheduled jobs often hold high-impact privileges, making long-lived secrets a repeatable compromise point on both the exam and in real environments. You’ll define durable keys versus short-lived tokens, then connect token lifetime, scope, audience restrictions, and issuance controls to reducing blast radius when something leaks. We’ll walk through a scenario where a pipeline token is accidentally printed into build logs, and you’ll trace how attackers pivot from log access to cloud control-plane actions when guardrails are missing. You’ll learn best practices such as mapping each job step to minimum required permissions, isolating runners, avoiding shared service identities, and restricting tokens so they only work from expected contexts and only for the resources needed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how automation identities in CI/CD, infrastructure-as-code, and scheduled jobs often hold high-impact privileges, making long-lived secrets a repeatable compromise point on both the exam and in real environments. You’ll define durable keys versus short-lived tokens, then connect token lifetime, scope, audience restrictions, and issuance controls to reducing blast radius when something leaks. We’ll walk through a scenario where a pipeline token is accidentally printed into build logs, and you’ll trace how attackers pivot from log access to cloud control-plane actions when guardrails are missing. You’ll learn best practices such as mapping each job step to minimum required permissions, isolating runners, avoiding shared service identities, and restricting tokens so they only work from expected contexts and only for the resources needed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:57:39 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/476ce5ed/5f99b9e3.mp3" length="38185892" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>954</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how automation identities in CI/CD, infrastructure-as-code, and scheduled jobs often hold high-impact privileges, making long-lived secrets a repeatable compromise point on both the exam and in real environments. You’ll define durable keys versus short-lived tokens, then connect token lifetime, scope, audience restrictions, and issuance controls to reducing blast radius when something leaks. We’ll walk through a scenario where a pipeline token is accidentally printed into build logs, and you’ll trace how attackers pivot from log access to cloud control-plane actions when guardrails are missing. You’ll learn best practices such as mapping each job step to minimum required permissions, isolating runners, avoiding shared service identities, and restricting tokens so they only work from expected contexts and only for the resources needed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/476ce5ed/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 22 — Recognize credential misuse signals hidden in everyday cloud activity </title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22 — Recognize credential misuse signals hidden in everyday cloud activity </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">efc2a8e4-d3f0-41cc-86bf-76d340dd94ce</guid>
      <link>https://share.transistor.fm/s/12e63021</link>
      <description>
        <![CDATA[<p>This episode trains you to spot subtle indicators of credential misuse that blend into normal cloud operations, a frequent exam theme when questions test detection logic rather than tool branding. You’ll define common misuse patterns such as unusual API call sequences, access from unexpected networks or regions, atypical resource enumeration, and spikes in denied actions that suggest permission probing. We’ll connect these signals to practical log sources and to the difference between authentication events and authorization outcomes, so you can determine whether activity is a user mistake, a broken automation job, or an adversary testing boundaries. A scenario follows a compromised identity that starts “quietly” by listing roles and storage, then escalates into data access, showing how early signals appear before the obvious damage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode trains you to spot subtle indicators of credential misuse that blend into normal cloud operations, a frequent exam theme when questions test detection logic rather than tool branding. You’ll define common misuse patterns such as unusual API call sequences, access from unexpected networks or regions, atypical resource enumeration, and spikes in denied actions that suggest permission probing. We’ll connect these signals to practical log sources and to the difference between authentication events and authorization outcomes, so you can determine whether activity is a user mistake, a broken automation job, or an adversary testing boundaries. A scenario follows a compromised identity that starts “quietly” by listing roles and storage, then escalates into data access, showing how early signals appear before the obvious damage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:58:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/12e63021/8a045c37.mp3" length="35423164" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>885</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode trains you to spot subtle indicators of credential misuse that blend into normal cloud operations, a frequent exam theme when questions test detection logic rather than tool branding. You’ll define common misuse patterns such as unusual API call sequences, access from unexpected networks or regions, atypical resource enumeration, and spikes in denied actions that suggest permission probing. We’ll connect these signals to practical log sources and to the difference between authentication events and authorization outcomes, so you can determine whether activity is a user mistake, a broken automation job, or an adversary testing boundaries. A scenario follows a compromised identity that starts “quietly” by listing roles and storage, then escalates into data access, showing how early signals appear before the obvious damage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/12e63021/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 23 — Audit cloud environments using benchmark tools and compliance lenses </title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23 — Audit cloud environments using benchmark tools and compliance lenses </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23dc5c8b-2bd4-4c20-808b-929893484ce7</guid>
      <link>https://share.transistor.fm/s/9f8b4f44</link>
      <description>
        <![CDATA[<p>This episode covers how cloud audits are performed using benchmark-aligned checks and compliance lenses, and how the GPCS exam expects you to reason about control intent even when the tooling varies. You’ll define what a benchmark is in this context—structured expectations for configuration, identity, logging, network exposure, and data protection—then learn how audit outputs translate into risk statements rather than just “pass/fail” noise. We’ll discuss how to interpret findings, prioritize by impact and exploitability, and avoid the trap of treating every alert as equal severity. A scenario walks through an audit report that flags permissive storage access, missing logging, and overly broad roles, and you’ll practice identifying which issues create immediate breach paths versus longer-term governance gaps. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers how cloud audits are performed using benchmark-aligned checks and compliance lenses, and how the GPCS exam expects you to reason about control intent even when the tooling varies. You’ll define what a benchmark is in this context—structured expectations for configuration, identity, logging, network exposure, and data protection—then learn how audit outputs translate into risk statements rather than just “pass/fail” noise. We’ll discuss how to interpret findings, prioritize by impact and exploitability, and avoid the trap of treating every alert as equal severity. A scenario walks through an audit report that flags permissive storage access, missing logging, and overly broad roles, and you’ll practice identifying which issues create immediate breach paths versus longer-term governance gaps. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:58:30 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9f8b4f44/a1665b80.mp3" length="31405529" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>785</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers how cloud audits are performed using benchmark-aligned checks and compliance lenses, and how the GPCS exam expects you to reason about control intent even when the tooling varies. You’ll define what a benchmark is in this context—structured expectations for configuration, identity, logging, network exposure, and data protection—then learn how audit outputs translate into risk statements rather than just “pass/fail” noise. We’ll discuss how to interpret findings, prioritize by impact and exploitability, and avoid the trap of treating every alert as equal severity. A scenario walks through an audit report that flags permissive storage access, missing logging, and overly broad roles, and you’ll practice identifying which issues create immediate breach paths versus longer-term governance gaps. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9f8b4f44/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 24 — Turn benchmark findings into concrete fixes that actually reduce risk </title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24 — Turn benchmark findings into concrete fixes that actually reduce risk </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">11dbcd8e-c8f2-44d8-86a6-1055ca26fa4d</guid>
      <link>https://share.transistor.fm/s/f097e349</link>
      <description>
        <![CDATA[<p>This episode focuses on converting benchmark findings into targeted remediation that measurably reduces risk, because exam questions often distinguish between “cosmetic compliance” and controls that break attack chains. You’ll learn how to restate a finding as an attacker outcome, identify the minimal configuration change that prevents that outcome, and validate the fix through testing and logging evidence. We’ll cover common remediation pitfalls: applying broad changes that break workloads, fixing symptoms without addressing root causes, and closing findings in a tool without confirming effective access is constrained. A scenario follows a benchmark alert about an overly permissive role; you’ll redesign it with least privilege, add conditions and resource scoping, and then verify that required operations still succeed while escalation paths fail. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on converting benchmark findings into targeted remediation that measurably reduces risk, because exam questions often distinguish between “cosmetic compliance” and controls that break attack chains. You’ll learn how to restate a finding as an attacker outcome, identify the minimal configuration change that prevents that outcome, and validate the fix through testing and logging evidence. We’ll cover common remediation pitfalls: applying broad changes that break workloads, fixing symptoms without addressing root causes, and closing findings in a tool without confirming effective access is constrained. A scenario follows a benchmark alert about an overly permissive role; you’ll redesign it with least privilege, add conditions and resource scoping, and then verify that required operations still succeed while escalation paths fail. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:58:57 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f097e349/f8763a01.mp3" length="31151621" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>778</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on converting benchmark findings into targeted remediation that measurably reduces risk, because exam questions often distinguish between “cosmetic compliance” and controls that break attack chains. You’ll learn how to restate a finding as an attacker outcome, identify the minimal configuration change that prevents that outcome, and validate the fix through testing and logging evidence. We’ll cover common remediation pitfalls: applying broad changes that break workloads, fixing symptoms without addressing root causes, and closing findings in a tool without confirming effective access is constrained. A scenario follows a benchmark alert about an overly permissive role; you’ll redesign it with least privilege, add conditions and resource scoping, and then verify that required operations still succeed while escalation paths fail. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f097e349/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 25 — Measure configuration drift and prove controls stay in place over time </title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25 — Measure configuration drift and prove controls stay in place over time </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2cfda532-a3dd-4891-b0cf-0b10dd98f03f</guid>
      <link>https://share.transistor.fm/s/98acf7cd</link>
      <description>
        <![CDATA[<p>This episode explains configuration drift as the slow undoing of your security posture through change, emergencies, and unmanaged variance, a real-world problem that the exam frames as governance, validation, and continuous control enforcement. You’ll define drift sources such as manual console edits, inconsistent templates, out-of-band hotfixes, and inherited permissions that change when upstream policy changes. We’ll show how to measure drift by establishing baselines, monitoring for deviation, and tying change events to identity and approval evidence so you can explain what changed and why. A scenario demonstrates a hardened storage configuration that quietly reverts after a deployment, and you’ll practice identifying the drift trigger and designing controls that prevent the same rollback from recurring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains configuration drift as the slow undoing of your security posture through change, emergencies, and unmanaged variance, a real-world problem that the exam frames as governance, validation, and continuous control enforcement. You’ll define drift sources such as manual console edits, inconsistent templates, out-of-band hotfixes, and inherited permissions that change when upstream policy changes. We’ll show how to measure drift by establishing baselines, monitoring for deviation, and tying change events to identity and approval evidence so you can explain what changed and why. A scenario demonstrates a hardened storage configuration that quietly reverts after a deployment, and you’ll practice identifying the drift trigger and designing controls that prevent the same rollback from recurring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:59:23 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/98acf7cd/40893383.mp3" length="31282235" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>781</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains configuration drift as the slow undoing of your security posture through change, emergencies, and unmanaged variance, a real-world problem that the exam frames as governance, validation, and continuous control enforcement. You’ll define drift sources such as manual console edits, inconsistent templates, out-of-band hotfixes, and inherited permissions that change when upstream policy changes. We’ll show how to measure drift by establishing baselines, monitoring for deviation, and tying change events to identity and approval evidence so you can explain what changed and why. A scenario demonstrates a hardened storage configuration that quietly reverts after a deployment, and you’ll practice identifying the drift trigger and designing controls that prevent the same rollback from recurring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/98acf7cd/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 26 — Build evidence-ready cloud auditing habits that survive real scrutiny </title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26 — Build evidence-ready cloud auditing habits that survive real scrutiny </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bc996ac5-4b84-4d07-ab9d-11b65c442e33</guid>
      <link>https://share.transistor.fm/s/d7173445</link>
      <description>
        <![CDATA[<p>This episode teaches how to produce audit evidence that is credible under scrutiny, aligning with exam expectations around accountability, traceability, and proving control operation rather than claiming it. You’ll define evidence types such as configuration state, policy documents, access logs, change records, and periodic review artifacts, then learn how to connect them into a narrative that answers: what control exists, who owns it, how it is enforced, and how you know it stayed effective over time. We’ll cover practical habits like standardizing evidence capture, timestamping, retaining logs to match investigation needs, and documenting exceptions with compensating controls. A scenario walks through an auditor asking for proof that admin access is controlled and monitored; you’ll assemble the minimal evidence package that demonstrates design, implementation, and operational oversight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to produce audit evidence that is credible under scrutiny, aligning with exam expectations around accountability, traceability, and proving control operation rather than claiming it. You’ll define evidence types such as configuration state, policy documents, access logs, change records, and periodic review artifacts, then learn how to connect them into a narrative that answers: what control exists, who owns it, how it is enforced, and how you know it stayed effective over time. We’ll cover practical habits like standardizing evidence capture, timestamping, retaining logs to match investigation needs, and documenting exceptions with compensating controls. A scenario walks through an auditor asking for proof that admin access is controlled and monitored; you’ll assemble the minimal evidence package that demonstrates design, implementation, and operational oversight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:59:51 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d7173445/c91888e9.mp3" length="28765074" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>719</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to produce audit evidence that is credible under scrutiny, aligning with exam expectations around accountability, traceability, and proving control operation rather than claiming it. You’ll define evidence types such as configuration state, policy documents, access logs, change records, and periodic review artifacts, then learn how to connect them into a narrative that answers: what control exists, who owns it, how it is enforced, and how you know it stayed effective over time. We’ll cover practical habits like standardizing evidence capture, timestamping, retaining logs to match investigation needs, and documenting exceptions with compensating controls. A scenario walks through an auditor asking for proof that admin access is controlled and monitored; you’ll assemble the minimal evidence package that demonstrates design, implementation, and operational oversight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d7173445/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 27 — Validate control effectiveness by testing what misconfigurations still allow </title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27 — Validate control effectiveness by testing what misconfigurations still allow </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0cba831b-b014-4b13-b592-a70c0e2e8ce1</guid>
      <link>https://share.transistor.fm/s/99d5eadf</link>
      <description>
        <![CDATA[<p>This episode focuses on validating whether controls actually block the misconfigurations and abuse paths they claim to address, which is central to exam reasoning about effectiveness versus intent. You’ll define control validation as targeted testing that attempts known failure modes—overbroad permissions, unexpected network exposure, insecure defaults, and missing logging—then confirms the expected prevention or detection outcomes. We’ll cover how to choose tests that are safe but meaningful, how to separate policy errors from implementation gaps, and how to interpret partial failures where a control works in one environment but not another. A scenario explores a “secured” workload identity that still allows role assumption into a more privileged identity, and you’ll practice adjusting conditions, scoping, and boundary policies until the escalation attempt fails and leaves clean audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on validating whether controls actually block the misconfigurations and abuse paths they claim to address, which is central to exam reasoning about effectiveness versus intent. You’ll define control validation as targeted testing that attempts known failure modes—overbroad permissions, unexpected network exposure, insecure defaults, and missing logging—then confirms the expected prevention or detection outcomes. We’ll cover how to choose tests that are safe but meaningful, how to separate policy errors from implementation gaps, and how to interpret partial failures where a control works in one environment but not another. A scenario explores a “secured” workload identity that still allows role assumption into a more privileged identity, and you’ll practice adjusting conditions, scoping, and boundary policies until the escalation attempt fails and leaves clean audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:00:38 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/99d5eadf/ff83eb4d.mp3" length="31180892" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>779</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on validating whether controls actually block the misconfigurations and abuse paths they claim to address, which is central to exam reasoning about effectiveness versus intent. You’ll define control validation as targeted testing that attempts known failure modes—overbroad permissions, unexpected network exposure, insecure defaults, and missing logging—then confirms the expected prevention or detection outcomes. We’ll cover how to choose tests that are safe but meaningful, how to separate policy errors from implementation gaps, and how to interpret partial failures where a control works in one environment but not another. A scenario explores a “secured” workload identity that still allows role assumption into a more privileged identity, and you’ll practice adjusting conditions, scoping, and boundary policies until the escalation attempt fails and leaves clean audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/99d5eadf/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 28 — Build end-user identity management that fits cloud realities, not wishful thinking </title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28 — Build end-user identity management that fits cloud realities, not wishful thinking </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">35ce17b5-58e4-4d90-a1cf-a278b9b07de3</guid>
      <link>https://share.transistor.fm/s/980e1762</link>
      <description>
        <![CDATA[<p>This episode explains end-user identity management in cloud environments with a focus on the practical constraints the GPCS exam tests: scale, federation, lifecycle management, and minimizing privileged access while preserving usability. You’ll define core identity lifecycle concepts—provisioning, role assignment, access reviews, deprovisioning, and break-glass—and connect them to cloud access patterns like console use, API use, and delegated administration. We’ll cover common failure modes such as stale accounts, reused group memberships, and ad hoc privilege grants that never get removed, plus how to design processes that make least privilege sustainable. A scenario follows a contractor onboarding that grants broad access for speed; you’ll redesign it using time limits, scoped roles, and review checkpoints that reduce exposure without blocking delivery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains end-user identity management in cloud environments with a focus on the practical constraints the GPCS exam tests: scale, federation, lifecycle management, and minimizing privileged access while preserving usability. You’ll define core identity lifecycle concepts—provisioning, role assignment, access reviews, deprovisioning, and break-glass—and connect them to cloud access patterns like console use, API use, and delegated administration. We’ll cover common failure modes such as stale accounts, reused group memberships, and ad hoc privilege grants that never get removed, plus how to design processes that make least privilege sustainable. A scenario follows a contractor onboarding that grants broad access for speed; you’ll redesign it using time limits, scoped roles, and review checkpoints that reduce exposure without blocking delivery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:01:04 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/980e1762/e174ce60.mp3" length="30434847" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>760</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains end-user identity management in cloud environments with a focus on the practical constraints the GPCS exam tests: scale, federation, lifecycle management, and minimizing privileged access while preserving usability. You’ll define core identity lifecycle concepts—provisioning, role assignment, access reviews, deprovisioning, and break-glass—and connect them to cloud access patterns like console use, API use, and delegated administration. We’ll cover common failure modes such as stale accounts, reused group memberships, and ad hoc privilege grants that never get removed, plus how to design processes that make least privilege sustainable. A scenario follows a contractor onboarding that grants broad access for speed; you’ll redesign it using time limits, scoped roles, and review checkpoints that reduce exposure without blocking delivery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/980e1762/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 29 — Evaluate cloud single sign-on solutions for security and operational resilience </title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29 — Evaluate cloud single sign-on solutions for security and operational resilience </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">00003974-4bcd-4d55-a7ce-b1d2b8989174</guid>
      <link>https://share.transistor.fm/s/2cfb7629</link>
      <description>
        <![CDATA[<p>This episode covers how to evaluate cloud single sign-on (SSO) in a way that balances security, reliability, and administrative clarity—exactly the tradeoffs exam questions tend to probe. You’ll define SSO as centralized authentication with delegated authorization, then examine what matters: strong authentication options, session controls, conditional access, logging visibility, and how identity outages or misconfigurations can become a single point of failure. We’ll discuss operational resilience concerns such as tenant lockout risks, recovery paths, and how to design emergency access that is controlled but usable under pressure. A scenario walks through an SSO configuration change that unintentionally relaxes access controls for a privileged group, and you’ll practice identifying where the control broke and what evidence would reveal misuse. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers how to evaluate cloud single sign-on (SSO) in a way that balances security, reliability, and administrative clarity—exactly the tradeoffs exam questions tend to probe. You’ll define SSO as centralized authentication with delegated authorization, then examine what matters: strong authentication options, session controls, conditional access, logging visibility, and how identity outages or misconfigurations can become a single point of failure. We’ll discuss operational resilience concerns such as tenant lockout risks, recovery paths, and how to design emergency access that is controlled but usable under pressure. A scenario walks through an SSO configuration change that unintentionally relaxes access controls for a privileged group, and you’ll practice identifying where the control broke and what evidence would reveal misuse. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:01:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2cfb7629/caea7594.mp3" length="28684637" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>716</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers how to evaluate cloud single sign-on (SSO) in a way that balances security, reliability, and administrative clarity—exactly the tradeoffs exam questions tend to probe. You’ll define SSO as centralized authentication with delegated authorization, then examine what matters: strong authentication options, session controls, conditional access, logging visibility, and how identity outages or misconfigurations can become a single point of failure. We’ll discuss operational resilience concerns such as tenant lockout risks, recovery paths, and how to design emergency access that is controlled but usable under pressure. A scenario walks through an SSO configuration change that unintentionally relaxes access controls for a privileged group, and you’ll practice identifying where the control broke and what evidence would reveal misuse. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2cfb7629/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 30 — Harden identity federation paths to prevent trust abuse and token misuse </title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30 — Harden identity federation paths to prevent trust abuse and token misuse </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">756186a1-e4d0-4ee2-a559-275b943cdd2f</guid>
      <link>https://share.transistor.fm/s/7ea5f87e</link>
      <description>
        <![CDATA[<p>This episode explains identity federation as a trust relationship that must be deliberately constrained, because federation failures often enable token misuse, lateral movement, and privilege escalation—high-value topics for the GPCS exam. You’ll define federation components such as identity providers, relying parties, assertions or tokens, and claim mapping, then connect misconfigurations to attacker outcomes like impersonation, overbroad access, or session replay across environments. We’ll cover hardening practices including strict audience and issuer validation, minimal and explicit claim mapping, scoped role assumption, short token lifetimes, and robust logging for assertion issuance and use. A scenario follows a trusted partner integration where overly permissive claims allow broader access than intended; you’ll redesign the trust so tokens are only valid for specific apps and roles, and you’ll validate success by attempting the original abuse path and confirming it fails with clear audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains identity federation as a trust relationship that must be deliberately constrained, because federation failures often enable token misuse, lateral movement, and privilege escalation—high-value topics for the GPCS exam. You’ll define federation components such as identity providers, relying parties, assertions or tokens, and claim mapping, then connect misconfigurations to attacker outcomes like impersonation, overbroad access, or session replay across environments. We’ll cover hardening practices including strict audience and issuer validation, minimal and explicit claim mapping, scoped role assumption, short token lifetimes, and robust logging for assertion issuance and use. A scenario follows a trusted partner integration where overly permissive claims allow broader access than intended; you’ll redesign the trust so tokens are only valid for specific apps and roles, and you’ll validate success by attempting the original abuse path and confirming it fails with clear audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:02:09 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7ea5f87e/d4f5c551.mp3" length="30669929" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>766</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains identity federation as a trust relationship that must be deliberately constrained, because federation failures often enable token misuse, lateral movement, and privilege escalation—high-value topics for the GPCS exam. You’ll define federation components such as identity providers, relying parties, assertions or tokens, and claim mapping, then connect misconfigurations to attacker outcomes like impersonation, overbroad access, or session replay across environments. We’ll cover hardening practices including strict audience and issuer validation, minimal and explicit claim mapping, scoped role assumption, short token lifetimes, and robust logging for assertion issuance and use. A scenario follows a trusted partner integration where overly permissive claims allow broader access than intended; you’ll redesign the trust so tokens are only valid for specific apps and roles, and you’ll validate success by attempting the original abuse path and confirming it fails with clear audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7ea5f87e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 31 — Detect identity anomalies by understanding normal authentication behaviors </title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31 — Detect identity anomalies by understanding normal authentication behaviors </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ad18b1c6-f8fd-4d6b-b016-bff5315ad8a1</guid>
      <link>https://share.transistor.fm/s/45ee7a05</link>
      <description>
        <![CDATA[<p>This episode teaches you how to define “normal” authentication behavior so anomalies become measurable signals instead of vague suspicion, a skill the GPCS exam tests when it asks you to choose the best detection or investigation step. You’ll clarify baselines such as typical login times, source networks, device patterns, MFA usage, session durations, and the common sequence of sign-in events that follow successful authentication. We’ll connect authentication telemetry to authorization outcomes so you can distinguish a harmless user mistake from adversary behavior like password spraying, impossible travel, token replay, or abnormal session creation. A scenario follows a privileged user account that begins authenticating from an unusual region and rapidly enumerates cloud services, and you’ll practice identifying which events matter first, what supporting logs to pivot to, and how to avoid false positives caused by legitimate travel or automation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you how to define “normal” authentication behavior so anomalies become measurable signals instead of vague suspicion, a skill the GPCS exam tests when it asks you to choose the best detection or investigation step. You’ll clarify baselines such as typical login times, source networks, device patterns, MFA usage, session durations, and the common sequence of sign-in events that follow successful authentication. We’ll connect authentication telemetry to authorization outcomes so you can distinguish a harmless user mistake from adversary behavior like password spraying, impossible travel, token replay, or abnormal session creation. A scenario follows a privileged user account that begins authenticating from an unusual region and rapidly enumerates cloud services, and you’ll practice identifying which events matter first, what supporting logs to pivot to, and how to avoid false positives caused by legitimate travel or automation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:02:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/45ee7a05/e1cfcf60.mp3" length="29971941" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>749</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you how to define “normal” authentication behavior so anomalies become measurable signals instead of vague suspicion, a skill the GPCS exam tests when it asks you to choose the best detection or investigation step. You’ll clarify baselines such as typical login times, source networks, device patterns, MFA usage, session durations, and the common sequence of sign-in events that follow successful authentication. We’ll connect authentication telemetry to authorization outcomes so you can distinguish a harmless user mistake from adversary behavior like password spraying, impossible travel, token replay, or abnormal session creation. A scenario follows a privileged user account that begins authenticating from an unusual region and rapidly enumerates cloud services, and you’ll practice identifying which events matter first, what supporting logs to pivot to, and how to avoid false positives caused by legitimate travel or automation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/45ee7a05/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 32 — Reduce token and session risk with strong lifecycle and revocation discipline </title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32 — Reduce token and session risk with strong lifecycle and revocation discipline </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d0f525a9-cb9e-4b72-b329-d0e11dc0620c</guid>
      <link>https://share.transistor.fm/s/e73398b1</link>
      <description>
        <![CDATA[<p>This episode focuses on token and session lifecycle management, because cloud breaches often succeed not by breaking MFA but by stealing and reusing sessions, refresh tokens, or long-lived access paths. You’ll define access tokens, refresh tokens, session cookies, and session state, then connect their lifetimes and renewal rules to practical risk: the longer a token lives and the broader its scope, the more valuable it is to an attacker. We’ll cover best practices such as short lifetimes for high-privilege sessions, strong reauthentication triggers, explicit logout and revocation workflows, and monitoring for token reuse from unexpected contexts. A scenario walks through a user who completes MFA once, then has a session token stolen via endpoint compromise; you’ll practice choosing controls that limit replay, force revalidation, and revoke quickly without locking out legitimate users during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on token and session lifecycle management, because cloud breaches often succeed not by breaking MFA but by stealing and reusing sessions, refresh tokens, or long-lived access paths. You’ll define access tokens, refresh tokens, session cookies, and session state, then connect their lifetimes and renewal rules to practical risk: the longer a token lives and the broader its scope, the more valuable it is to an attacker. We’ll cover best practices such as short lifetimes for high-privilege sessions, strong reauthentication triggers, explicit logout and revocation workflows, and monitoring for token reuse from unexpected contexts. A scenario walks through a user who completes MFA once, then has a session token stolen via endpoint compromise; you’ll practice choosing controls that limit replay, force revalidation, and revoke quickly without locking out legitimate users during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:03:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e73398b1/5c0e59f5.mp3" length="28967800" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>724</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on token and session lifecycle management, because cloud breaches often succeed not by breaking MFA but by stealing and reusing sessions, refresh tokens, or long-lived access paths. You’ll define access tokens, refresh tokens, session cookies, and session state, then connect their lifetimes and renewal rules to practical risk: the longer a token lives and the broader its scope, the more valuable it is to an attacker. We’ll cover best practices such as short lifetimes for high-privilege sessions, strong reauthentication triggers, explicit logout and revocation workflows, and monitoring for token reuse from unexpected contexts. A scenario walks through a user who completes MFA once, then has a session token stolen via endpoint compromise; you’ll practice choosing controls that limit replay, force revalidation, and revoke quickly without locking out legitimate users during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e73398b1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 33 — Design key management systems with clear ownership and strong boundaries </title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33 — Design key management systems with clear ownership and strong boundaries </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">904201a3-e441-4c2c-a5e1-5cc7b95b9ed0</guid>
      <link>https://share.transistor.fm/s/70a453fa</link>
      <description>
        <![CDATA[<p>This episode explains how to design key management so encryption is not just “turned on,” but governed, auditable, and resilient under real operational pressure—exactly the angle the GPCS exam expects. You’ll define key ownership, key hierarchy concepts, and the separation between data encryption keys and the systems that wrap, store, and authorize their use. We’ll discuss boundary design: which teams can create keys, who can use keys for encrypt/decrypt, who can rotate or disable keys, and how to prevent a single role from holding end-to-end power. A scenario compares two designs: one where developers can both manage and use production keys, and one where ownership, usage, and audit review are separated with explicit approval paths and scoped permissions. You’ll leave with a threat-driven approach for building KMS designs that resist misuse while still supporting reliable application delivery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to design key management so encryption is not just “turned on,” but governed, auditable, and resilient under real operational pressure—exactly the angle the GPCS exam expects. You’ll define key ownership, key hierarchy concepts, and the separation between data encryption keys and the systems that wrap, store, and authorize their use. We’ll discuss boundary design: which teams can create keys, who can use keys for encrypt/decrypt, who can rotate or disable keys, and how to prevent a single role from holding end-to-end power. A scenario compares two designs: one where developers can both manage and use production keys, and one where ownership, usage, and audit review are separated with explicit approval paths and scoped permissions. You’ll leave with a threat-driven approach for building KMS designs that resist misuse while still supporting reliable application delivery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:03:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/70a453fa/9d5484fc.mp3" length="37858827" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>946</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to design key management so encryption is not just “turned on,” but governed, auditable, and resilient under real operational pressure—exactly the angle the GPCS exam expects. You’ll define key ownership, key hierarchy concepts, and the separation between data encryption keys and the systems that wrap, store, and authorize their use. We’ll discuss boundary design: which teams can create keys, who can use keys for encrypt/decrypt, who can rotate or disable keys, and how to prevent a single role from holding end-to-end power. A scenario compares two designs: one where developers can both manage and use production keys, and one where ownership, usage, and audit review are separated with explicit approval paths and scoped permissions. You’ll leave with a threat-driven approach for building KMS designs that resist misuse while still supporting reliable application delivery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/70a453fa/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 34 — Assess KMS security posture using threat-driven questions that reveal gaps </title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34 — Assess KMS security posture using threat-driven questions that reveal gaps </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">27a34263-8c7e-4cf2-a7a4-c288f5bb0d21</guid>
      <link>https://share.transistor.fm/s/fdbeb9bf</link>
      <description>
        <![CDATA[<p>This episode teaches you how to evaluate a key management service (KMS) posture using questions that surface real weaknesses, which is a common exam pattern when you must choose the most meaningful assessment action. You’ll frame KMS threats such as unauthorized key use, key deletion or disablement, policy tampering, and stealthy decryption by overly privileged identities, then map each threat to what you should verify in configuration and logs. We’ll cover assessment prompts like: who can administer keys, who can use keys, are permissions scoped to specific keys and resources, are conditions enforced, and is key usage logging complete and reviewable. A scenario walks through an environment where encryption is enabled but a broad role can decrypt any dataset; you’ll identify the gap, explain why it matters, and outline the specific checks that confirm whether misuse would be detectable and reversible. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you how to evaluate a key management service (KMS) posture using questions that surface real weaknesses, which is a common exam pattern when you must choose the most meaningful assessment action. You’ll frame KMS threats such as unauthorized key use, key deletion or disablement, policy tampering, and stealthy decryption by overly privileged identities, then map each threat to what you should verify in configuration and logs. We’ll cover assessment prompts like: who can administer keys, who can use keys, are permissions scoped to specific keys and resources, are conditions enforced, and is key usage logging complete and reviewable. A scenario walks through an environment where encryption is enabled but a broad role can decrypt any dataset; you’ll identify the gap, explain why it matters, and outline the specific checks that confirm whether misuse would be detectable and reversible. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:05:30 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fdbeb9bf/f2930323.mp3" length="38089753" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>952</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you how to evaluate a key management service (KMS) posture using questions that surface real weaknesses, which is a common exam pattern when you must choose the most meaningful assessment action. You’ll frame KMS threats such as unauthorized key use, key deletion or disablement, policy tampering, and stealthy decryption by overly privileged identities, then map each threat to what you should verify in configuration and logs. We’ll cover assessment prompts like: who can administer keys, who can use keys, are permissions scoped to specific keys and resources, are conditions enforced, and is key usage logging complete and reviewable. A scenario walks through an environment where encryption is enabled but a broad role can decrypt any dataset; you’ll identify the gap, explain why it matters, and outline the specific checks that confirm whether misuse would be detectable and reversible. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fdbeb9bf/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 35 — Prevent key misuse through permissions, separation, and careful key lifecycle </title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35 — Prevent key misuse through permissions, separation, and careful key lifecycle </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8996c011-eb4b-466b-9f4f-528d37239112</guid>
      <link>https://share.transistor.fm/s/9df4d616</link>
      <description>
        <![CDATA[<p>This episode focuses on preventing key misuse by combining least-privilege permissions, separation of duties, and disciplined key lifecycle management, all of which the GPCS exam ties to confidentiality, integrity, and operational recoverability. You’ll define lifecycle stages—creation, activation, rotation, suspension, and destruction—and connect each stage to risks like accidental lockout, malicious disablement, or unauthorized decryption. We’ll emphasize permissions design that separates key administrators from key users, limits where keys can be invoked, and uses conditions so keys cannot be used from unexpected contexts or for unintended resources. A scenario explores a ransomware-style event where an attacker gains access to an administrative identity; you’ll evaluate how key deletion protections, strict admin boundaries, and rapid revocation steps can prevent total data loss and preserve forensic evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on preventing key misuse by combining least-privilege permissions, separation of duties, and disciplined key lifecycle management, all of which the GPCS exam ties to confidentiality, integrity, and operational recoverability. You’ll define lifecycle stages—creation, activation, rotation, suspension, and destruction—and connect each stage to risks like accidental lockout, malicious disablement, or unauthorized decryption. We’ll emphasize permissions design that separates key administrators from key users, limits where keys can be invoked, and uses conditions so keys cannot be used from unexpected contexts or for unintended resources. A scenario explores a ransomware-style event where an attacker gains access to an administrative identity; you’ll evaluate how key deletion protections, strict admin boundaries, and rapid revocation steps can prevent total data loss and preserve forensic evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:06:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9df4d616/61cdcb42.mp3" length="41442837" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1035</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on preventing key misuse by combining least-privilege permissions, separation of duties, and disciplined key lifecycle management, all of which the GPCS exam ties to confidentiality, integrity, and operational recoverability. You’ll define lifecycle stages—creation, activation, rotation, suspension, and destruction—and connect each stage to risks like accidental lockout, malicious disablement, or unauthorized decryption. We’ll emphasize permissions design that separates key administrators from key users, limits where keys can be invoked, and uses conditions so keys cannot be used from unexpected contexts or for unintended resources. A scenario explores a ransomware-style event where an attacker gains access to an administrative identity; you’ll evaluate how key deletion protections, strict admin boundaries, and rapid revocation steps can prevent total data loss and preserve forensic evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9df4d616/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 36 — Encrypt sensitive data in cloud platforms with sane defaults and verified outcomes </title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36 — Encrypt sensitive data in cloud platforms with sane defaults and verified outcomes </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0ff7fc19-a94d-474f-ac6c-4c21fced490b</guid>
      <link>https://share.transistor.fm/s/c695ffb3</link>
      <description>
        <![CDATA[<p>This episode explains how to implement encryption for sensitive cloud data in a way that is both exam-correct and operationally dependable, focusing on what encryption actually guarantees and what it does not. You’ll define encryption at rest, encryption in transit, and the role of key management, then connect these definitions to how cloud services apply encryption by default versus where you must explicitly configure it. We’ll highlight the difference between “service says encrypted” and “data is provably protected,” including how identity permissions can effectively bypass encryption if decrypt rights are too broad. A scenario covers a storage service with default encryption enabled but weak access controls, and you’ll practice validating that encryption is applied to the right data, that keys are properly governed, and that logs can prove what was accessed and by whom during an investigation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to implement encryption for sensitive cloud data in a way that is both exam-correct and operationally dependable, focusing on what encryption actually guarantees and what it does not. You’ll define encryption at rest, encryption in transit, and the role of key management, then connect these definitions to how cloud services apply encryption by default versus where you must explicitly configure it. We’ll highlight the difference between “service says encrypted” and “data is provably protected,” including how identity permissions can effectively bypass encryption if decrypt rights are too broad. A scenario covers a storage service with default encryption enabled but weak access controls, and you’ll practice validating that encryption is applied to the right data, that keys are properly governed, and that logs can prove what was accessed and by whom during an investigation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:06:25 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c695ffb3/2840b16f.mp3" length="39641443" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>990</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to implement encryption for sensitive cloud data in a way that is both exam-correct and operationally dependable, focusing on what encryption actually guarantees and what it does not. You’ll define encryption at rest, encryption in transit, and the role of key management, then connect these definitions to how cloud services apply encryption by default versus where you must explicitly configure it. We’ll highlight the difference between “service says encrypted” and “data is provably protected,” including how identity permissions can effectively bypass encryption if decrypt rights are too broad. A scenario covers a storage service with default encryption enabled but weak access controls, and you’ll practice validating that encryption is applied to the right data, that keys are properly governed, and that logs can prove what was accessed and by whom during an investigation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c695ffb3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 37 — Choose encryption approaches that survive incident response and legal scrutiny </title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37 — Choose encryption approaches that survive incident response and legal scrutiny </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">132bc784-cf86-4e38-8d5d-46ead478a276</guid>
      <link>https://share.transistor.fm/s/329039e0</link>
      <description>
        <![CDATA[<p>This episode teaches you how to choose encryption approaches that remain defensible under incident response pressure and legal scrutiny, where you may need to prove what was protected, what keys were used, and whether unauthorized decryption likely occurred. You’ll compare provider-managed keys, customer-managed keys, and application-managed encryption, focusing on control, auditability, operational risk, and the ability to rotate or revoke access during a breach. We’ll connect these choices to exam scenarios that ask you to balance security objectives with maintainability and evidence readiness, especially when regulators or counsel require clear documentation of protections. A scenario explores a suspected insider access case where encryption exists but key usage logs are incomplete; you’ll evaluate which approach produces stronger evidence, how to improve logging and separation, and how to design your key policies so emergency revocation is possible without destroying business continuity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you how to choose encryption approaches that remain defensible under incident response pressure and legal scrutiny, where you may need to prove what was protected, what keys were used, and whether unauthorized decryption likely occurred. You’ll compare provider-managed keys, customer-managed keys, and application-managed encryption, focusing on control, auditability, operational risk, and the ability to rotate or revoke access during a breach. We’ll connect these choices to exam scenarios that ask you to balance security objectives with maintainability and evidence readiness, especially when regulators or counsel require clear documentation of protections. A scenario explores a suspected insider access case where encryption exists but key usage logs are incomplete; you’ll evaluate which approach produces stronger evidence, how to improve logging and separation, and how to design your key policies so emergency revocation is possible without destroying business continuity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:06:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/329039e0/17312874.mp3" length="35298839" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>882</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you how to choose encryption approaches that remain defensible under incident response pressure and legal scrutiny, where you may need to prove what was protected, what keys were used, and whether unauthorized decryption likely occurred. You’ll compare provider-managed keys, customer-managed keys, and application-managed encryption, focusing on control, auditability, operational risk, and the ability to rotate or revoke access during a breach. We’ll connect these choices to exam scenarios that ask you to balance security objectives with maintainability and evidence readiness, especially when regulators or counsel require clear documentation of protections. A scenario explores a suspected insider access case where encryption exists but key usage logs are incomplete; you’ll evaluate which approach produces stronger evidence, how to improve logging and separation, and how to design your key policies so emergency revocation is possible without destroying business continuity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/329039e0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 38 — Protect encryption workflows from misconfigurations that silently disable security </title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38 — Protect encryption workflows from misconfigurations that silently disable security </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1251cd1d-3e61-4581-93f8-347071d82ebf</guid>
      <link>https://share.transistor.fm/s/941036f5</link>
      <description>
        <![CDATA[<p>This episode covers how encryption controls fail quietly through misconfiguration, which the GPCS exam often tests by presenting “encrypted” environments that are actually exposed due to policy, service, or workflow mistakes. You’ll learn how misconfigurations happen: using the wrong key for the wrong dataset, allowing broad decrypt permissions, skipping encryption on specific object types, or deploying services where encryption settings are not inherited as expected. We’ll discuss best practices like enforcing encryption requirements through policy, limiting where keys can be used, validating configuration with targeted tests, and monitoring for resources created without required encryption settings. A scenario walks through a new workload deployed by template that bypasses the intended encryption configuration; you’ll identify the failure point, apply a durable guardrail, and confirm the fix with evidence that would satisfy both a security review and an exam question asking for the “best next step.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers how encryption controls fail quietly through misconfiguration, which the GPCS exam often tests by presenting “encrypted” environments that are actually exposed due to policy, service, or workflow mistakes. You’ll learn how misconfigurations happen: using the wrong key for the wrong dataset, allowing broad decrypt permissions, skipping encryption on specific object types, or deploying services where encryption settings are not inherited as expected. We’ll discuss best practices like enforcing encryption requirements through policy, limiting where keys can be used, validating configuration with targeted tests, and monitoring for resources created without required encryption settings. A scenario walks through a new workload deployed by template that bypasses the intended encryption configuration; you’ll identify the failure point, apply a durable guardrail, and confirm the fix with evidence that would satisfy both a security review and an exam question asking for the “best next step.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:07:09 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/941036f5/81588cfa.mp3" length="41496137" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1037</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers how encryption controls fail quietly through misconfiguration, which the GPCS exam often tests by presenting “encrypted” environments that are actually exposed due to policy, service, or workflow mistakes. You’ll learn how misconfigurations happen: using the wrong key for the wrong dataset, allowing broad decrypt permissions, skipping encryption on specific object types, or deploying services where encryption settings are not inherited as expected. We’ll discuss best practices like enforcing encryption requirements through policy, limiting where keys can be used, validating configuration with targeted tests, and monitoring for resources created without required encryption settings. A scenario walks through a new workload deployed by template that bypasses the intended encryption configuration; you’ll identify the failure point, apply a durable guardrail, and confirm the fix with evidence that would satisfy both a security review and an exam question asking for the “best next step.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/941036f5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 39 — Validate encryption coverage so “enabled” means provably protecting the data </title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39 — Validate encryption coverage so “enabled” means provably protecting the data </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6cc4cca7-de3a-4183-a0e0-127eb87115d4</guid>
      <link>https://share.transistor.fm/s/7d12943a</link>
      <description>
        <![CDATA[<p>This episode focuses on proving encryption coverage, because “enabled” is not the same as “effective,” and exam questions often probe whether you can verify coverage across services, datasets, and access paths. You’ll define coverage as the set of data objects and storage locations that are actually encrypted with the intended keys, under the intended policies, and with the intended access restrictions. We’ll cover validation techniques such as sampling resources across environments, checking service configurations and key associations, verifying that unencrypted creation is blocked, and confirming that key usage logging exists to support investigations. A scenario uses a multi-environment storage footprint where one region is missing required encryption enforcement; you’ll practice finding the gap, determining impact, and implementing a control that prevents recurrence while producing audit-ready evidence of compliance and security. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on proving encryption coverage, because “enabled” is not the same as “effective,” and exam questions often probe whether you can verify coverage across services, datasets, and access paths. You’ll define coverage as the set of data objects and storage locations that are actually encrypted with the intended keys, under the intended policies, and with the intended access restrictions. We’ll cover validation techniques such as sampling resources across environments, checking service configurations and key associations, verifying that unencrypted creation is blocked, and confirming that key usage logging exists to support investigations. A scenario uses a multi-environment storage footprint where one region is missing required encryption enforcement; you’ll practice finding the gap, determining impact, and implementing a control that prevents recurrence while producing audit-ready evidence of compliance and security. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:07:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7d12943a/dbfd484c.mp3" length="45578541" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1139</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on proving encryption coverage, because “enabled” is not the same as “effective,” and exam questions often probe whether you can verify coverage across services, datasets, and access paths. You’ll define coverage as the set of data objects and storage locations that are actually encrypted with the intended keys, under the intended policies, and with the intended access restrictions. We’ll cover validation techniques such as sampling resources across environments, checking service configurations and key associations, verifying that unencrypted creation is blocked, and confirming that key usage logging exists to support investigations. A scenario uses a multi-environment storage footprint where one region is missing required encryption enforcement; you’ll practice finding the gap, determining impact, and implementing a control that prevents recurrence while producing audit-ready evidence of compliance and security. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7d12943a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 40 — Secure cloud storage services by design, not by hope</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40 — Secure cloud storage services by design, not by hope</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fa81dd3b-2ccf-4b6f-ae1f-1cf2436dc31f</guid>
      <link>https://share.transistor.fm/s/d18f7a02</link>
      <description>
        <![CDATA[<p>This episode introduces cloud storage security as an architecture problem, not a checklist, aligning with GPCS exam questions that test default risk, access design, and detection readiness for high-value data services. You’ll define core storage risks such as unintended public exposure, overly broad internal access, insecure sharing links, weak data boundaries between environments, and missing logging that hides exfiltration. We’ll cover design principles: explicit access patterns, least-privilege permissions, strong identity controls, encryption with governed keys, and consistent configuration enforced through templates and policy guardrails. A scenario walks through a team that relies on “nobody will find it” assumptions until a misconfiguration exposes sensitive data; you’ll identify what controls would have prevented exposure, what logs would reveal the timeline, and how to redesign storage access so secure sharing is the easiest path. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces cloud storage security as an architecture problem, not a checklist, aligning with GPCS exam questions that test default risk, access design, and detection readiness for high-value data services. You’ll define core storage risks such as unintended public exposure, overly broad internal access, insecure sharing links, weak data boundaries between environments, and missing logging that hides exfiltration. We’ll cover design principles: explicit access patterns, least-privilege permissions, strong identity controls, encryption with governed keys, and consistent configuration enforced through templates and policy guardrails. A scenario walks through a team that relies on “nobody will find it” assumptions until a misconfiguration exposes sensitive data; you’ll identify what controls would have prevented exposure, what logs would reveal the timeline, and how to redesign storage access so secure sharing is the easiest path. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:07:58 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d18f7a02/5d9b92ca.mp3" length="40591193" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1014</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces cloud storage security as an architecture problem, not a checklist, aligning with GPCS exam questions that test default risk, access design, and detection readiness for high-value data services. You’ll define core storage risks such as unintended public exposure, overly broad internal access, insecure sharing links, weak data boundaries between environments, and missing logging that hides exfiltration. We’ll cover design principles: explicit access patterns, least-privilege permissions, strong identity controls, encryption with governed keys, and consistent configuration enforced through templates and policy guardrails. A scenario walks through a team that relies on “nobody will find it” assumptions until a misconfiguration exposes sensitive data; you’ll identify what controls would have prevented exposure, what logs would reveal the timeline, and how to redesign storage access so secure sharing is the easiest path. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d18f7a02/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 41 — Prevent accidental public exposure with durable storage access patterns </title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41 — Prevent accidental public exposure with durable storage access patterns </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">68247f57-4de0-4002-8d6a-3694da615260</guid>
      <link>https://share.transistor.fm/s/159773db</link>
      <description>
        <![CDATA[<p>This episode explains how cloud storage becomes publicly reachable through default sharing behaviors, inherited permissions, and convenience-driven configuration, and why the GPCS exam tests your ability to recognize “public by mistake” patterns quickly. You’ll define what public exposure means across object, bucket, container, and share constructs, then connect common root causes such as anonymous access settings, overly broad ACL-style grants, and permissive sharing links that outlive their purpose. We’ll walk through a scenario where a team publishes one asset for a demo and accidentally leaves a broader path open, then you’ll practice selecting durable access patterns that prevent recurrence, including explicit allow lists, scoped principals, and environment segmentation that keeps test data from blending with production. You’ll also learn how to validate exposure status with logging and targeted checks, and how to document safe sharing workflows so “quick” does not become “open.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how cloud storage becomes publicly reachable through default sharing behaviors, inherited permissions, and convenience-driven configuration, and why the GPCS exam tests your ability to recognize “public by mistake” patterns quickly. You’ll define what public exposure means across object, bucket, container, and share constructs, then connect common root causes such as anonymous access settings, overly broad ACL-style grants, and permissive sharing links that outlive their purpose. We’ll walk through a scenario where a team publishes one asset for a demo and accidentally leaves a broader path open, then you’ll practice selecting durable access patterns that prevent recurrence, including explicit allow lists, scoped principals, and environment segmentation that keeps test data from blending with production. You’ll also learn how to validate exposure status with logging and targeted checks, and how to document safe sharing workflows so “quick” does not become “open.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:08:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/159773db/f2102353.mp3" length="42734319" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1068</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how cloud storage becomes publicly reachable through default sharing behaviors, inherited permissions, and convenience-driven configuration, and why the GPCS exam tests your ability to recognize “public by mistake” patterns quickly. You’ll define what public exposure means across object, bucket, container, and share constructs, then connect common root causes such as anonymous access settings, overly broad ACL-style grants, and permissive sharing links that outlive their purpose. We’ll walk through a scenario where a team publishes one asset for a demo and accidentally leaves a broader path open, then you’ll practice selecting durable access patterns that prevent recurrence, including explicit allow lists, scoped principals, and environment segmentation that keeps test data from blending with production. You’ll also learn how to validate exposure status with logging and targeted checks, and how to document safe sharing workflows so “quick” does not become “open.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/159773db/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 42 — Control storage permissions with least privilege and tight data boundaries </title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42 — Control storage permissions with least privilege and tight data boundaries </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0f1a9d42-76e9-4946-89af-1580900416e8</guid>
      <link>https://share.transistor.fm/s/e93d921f</link>
      <description>
        <![CDATA[<p>This episode focuses on designing storage permissions so access is intentional, reviewable, and limited to the smallest practical scope, which maps directly to exam questions about effective access and real-world questions about containment. You’ll define identity-based permissions versus resource-based permissions, then learn how scoping works at the level of accounts, projects, resource groups, buckets, containers, and prefixes so you can prevent a role that needs one dataset from gaining visibility into everything. We’ll explore boundary design for sensitive data, including separating environments, separating regulated data, and minimizing cross-team access by default, then apply those concepts to a scenario where a shared “data engineering” role can read multiple business units’ exports because no boundaries were enforced. You’ll also cover troubleshooting considerations such as broken applications after permission tightening, how to identify the missing action without resorting to wildcards, and how to prove the final policy meets functional needs while closing the original overreach. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on designing storage permissions so access is intentional, reviewable, and limited to the smallest practical scope, which maps directly to exam questions about effective access and real-world questions about containment. You’ll define identity-based permissions versus resource-based permissions, then learn how scoping works at the level of accounts, projects, resource groups, buckets, containers, and prefixes so you can prevent a role that needs one dataset from gaining visibility into everything. We’ll explore boundary design for sensitive data, including separating environments, separating regulated data, and minimizing cross-team access by default, then apply those concepts to a scenario where a shared “data engineering” role can read multiple business units’ exports because no boundaries were enforced. You’ll also cover troubleshooting considerations such as broken applications after permission tightening, how to identify the missing action without resorting to wildcards, and how to prove the final policy meets functional needs while closing the original overreach. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:08:43 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e93d921f/d82f6b8b.mp3" length="36287304" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>907</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on designing storage permissions so access is intentional, reviewable, and limited to the smallest practical scope, which maps directly to exam questions about effective access and real-world questions about containment. You’ll define identity-based permissions versus resource-based permissions, then learn how scoping works at the level of accounts, projects, resource groups, buckets, containers, and prefixes so you can prevent a role that needs one dataset from gaining visibility into everything. We’ll explore boundary design for sensitive data, including separating environments, separating regulated data, and minimizing cross-team access by default, then apply those concepts to a scenario where a shared “data engineering” role can read multiple business units’ exports because no boundaries were enforced. You’ll also cover troubleshooting considerations such as broken applications after permission tightening, how to identify the missing action without resorting to wildcards, and how to prove the final policy meets functional needs while closing the original overreach. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e93d921f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 43 — Reduce cloud storage data exfiltration risk with detection-minded controls </title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43 — Reduce cloud storage data exfiltration risk with detection-minded controls </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0bc21040-5f8f-4704-a2f5-aa13147419ba</guid>
      <link>https://share.transistor.fm/s/af27da09</link>
      <description>
        <![CDATA[<p>This episode teaches you to reduce exfiltration risk by combining prevention and detection in storage design, because the GPCS exam often rewards answers that interrupt attacker workflows and also produce evidence. You’ll define exfiltration in cloud storage terms, including bulk downloads, stealthy object-by-object pulls, and misuse of sharing mechanisms that turn private data into externally accessible data. We’ll cover control choices that are “detection-minded,” such as limiting list and read permissions, separating write from read, enforcing encryption and key-use constraints, and ensuring storage access generates high-quality logs that can be correlated to identities and network origins. A scenario walks through a compromised service identity that begins enumerating and downloading objects at an unusual rate; you’ll practice choosing controls that limit what it can access, and also ensure the event is visible early enough to respond. You’ll leave with a framework for answering exam questions that ask for the best mitigation when storage is high value and attackers are patient. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you to reduce exfiltration risk by combining prevention and detection in storage design, because the GPCS exam often rewards answers that interrupt attacker workflows and also produce evidence. You’ll define exfiltration in cloud storage terms, including bulk downloads, stealthy object-by-object pulls, and misuse of sharing mechanisms that turn private data into externally accessible data. We’ll cover control choices that are “detection-minded,” such as limiting list and read permissions, separating write from read, enforcing encryption and key-use constraints, and ensuring storage access generates high-quality logs that can be correlated to identities and network origins. A scenario walks through a compromised service identity that begins enumerating and downloading objects at an unusual rate; you’ll practice choosing controls that limit what it can access, and also ensure the event is visible early enough to respond. You’ll leave with a framework for answering exam questions that ask for the best mitigation when storage is high value and attackers are patient. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:09:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/af27da09/1c0afadf.mp3" length="33147386" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>828</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you to reduce exfiltration risk by combining prevention and detection in storage design, because the GPCS exam often rewards answers that interrupt attacker workflows and also produce evidence. You’ll define exfiltration in cloud storage terms, including bulk downloads, stealthy object-by-object pulls, and misuse of sharing mechanisms that turn private data into externally accessible data. We’ll cover control choices that are “detection-minded,” such as limiting list and read permissions, separating write from read, enforcing encryption and key-use constraints, and ensuring storage access generates high-quality logs that can be correlated to identities and network origins. A scenario walks through a compromised service identity that begins enumerating and downloading objects at an unusual rate; you’ll practice choosing controls that limit what it can access, and also ensure the event is visible early enough to respond. You’ll leave with a framework for answering exam questions that ask for the best mitigation when storage is high value and attackers are patient. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/af27da09/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 44 — Detect storage abuse through access patterns, anomalies, and logging discipline</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44 — Detect storage abuse through access patterns, anomalies, and logging discipline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a284ae01-1644-4b40-8ebd-76e1e08dd2bb</guid>
      <link>https://share.transistor.fm/s/7a838f8b</link>
      <description>
        <![CDATA[<p>This episode explains how to detect storage abuse by learning what normal access looks like and then identifying deviations that indicate misuse, a common GPCS pattern when questions test analysis rather than vendor features. You’ll define storage-relevant signals such as unusual listing behavior, spikes in read volume, access from new locations or identities, repeated access-denied events that indicate probing, and suspicious use of sharing workflows. We’ll connect these patterns to logging discipline: ensuring access events are captured, time-synchronized, retained long enough for investigations, and enriched with identity context so you can attribute actions. A scenario follows a user account that rarely touches storage but suddenly performs broad listings and downloads during off-hours, and you’ll practice deciding what to check first, what evidence confirms abuse versus a legitimate job, and how to tune alerts to avoid constant noise. The goal is to build a reliable detection mindset that matches exam expectations and supports real incident triage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to detect storage abuse by learning what normal access looks like and then identifying deviations that indicate misuse, a common GPCS pattern when questions test analysis rather than vendor features. You’ll define storage-relevant signals such as unusual listing behavior, spikes in read volume, access from new locations or identities, repeated access-denied events that indicate probing, and suspicious use of sharing workflows. We’ll connect these patterns to logging discipline: ensuring access events are captured, time-synchronized, retained long enough for investigations, and enriched with identity context so you can attribute actions. A scenario follows a user account that rarely touches storage but suddenly performs broad listings and downloads during off-hours, and you’ll practice deciding what to check first, what evidence confirms abuse versus a legitimate job, and how to tune alerts to avoid constant noise. The goal is to build a reliable detection mindset that matches exam expectations and supports real incident triage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:10:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7a838f8b/cd1fcc64.mp3" length="30802643" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>769</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to detect storage abuse by learning what normal access looks like and then identifying deviations that indicate misuse, a common GPCS pattern when questions test analysis rather than vendor features. You’ll define storage-relevant signals such as unusual listing behavior, spikes in read volume, access from new locations or identities, repeated access-denied events that indicate probing, and suspicious use of sharing workflows. We’ll connect these patterns to logging discipline: ensuring access events are captured, time-synchronized, retained long enough for investigations, and enriched with identity context so you can attribute actions. A scenario follows a user account that rarely touches storage but suddenly performs broad listings and downloads during off-hours, and you’ll practice deciding what to check first, what evidence confirms abuse versus a legitimate job, and how to tune alerts to avoid constant noise. The goal is to build a reliable detection mindset that matches exam expectations and supports real incident triage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7a838f8b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 45 — Respond to storage misconfiguration signals before they become headlines </title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45 — Respond to storage misconfiguration signals before they become headlines </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f169ca3c-61c1-4500-b4a3-e07b170aeb09</guid>
      <link>https://share.transistor.fm/s/3a18ee4b</link>
      <description>
        <![CDATA[<p>This episode focuses on early response when storage misconfiguration signals appear, emphasizing the exam-relevant difference between containment, validation, and full remediation. You’ll define misconfiguration signals such as newly public resources, policy changes that widen access, missing encryption enforcement, or alerts that indicate anonymous reads, then learn how to verify whether the signal reflects real exposure and what data could be impacted. We’ll walk through a scenario where an automated check flags a storage container as publicly accessible after a deployment, and you’ll practice a response sequence that preserves evidence, quickly restricts access, and evaluates whether access occurred before the fix. You’ll also cover operational pitfalls like “fixing” by deleting logs or changing too many settings at once, and how to coordinate with owners so the fix doesn’t break critical workflows. The episode equips you to choose the best next action under time pressure, which is exactly what many exam questions are really measuring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on early response when storage misconfiguration signals appear, emphasizing the exam-relevant difference between containment, validation, and full remediation. You’ll define misconfiguration signals such as newly public resources, policy changes that widen access, missing encryption enforcement, or alerts that indicate anonymous reads, then learn how to verify whether the signal reflects real exposure and what data could be impacted. We’ll walk through a scenario where an automated check flags a storage container as publicly accessible after a deployment, and you’ll practice a response sequence that preserves evidence, quickly restricts access, and evaluates whether access occurred before the fix. You’ll also cover operational pitfalls like “fixing” by deleting logs or changing too many settings at once, and how to coordinate with owners so the fix doesn’t break critical workflows. The episode equips you to choose the best next action under time pressure, which is exactly what many exam questions are really measuring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:10:22 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3a18ee4b/b080f982.mp3" length="30349145" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>758</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on early response when storage misconfiguration signals appear, emphasizing the exam-relevant difference between containment, validation, and full remediation. You’ll define misconfiguration signals such as newly public resources, policy changes that widen access, missing encryption enforcement, or alerts that indicate anonymous reads, then learn how to verify whether the signal reflects real exposure and what data could be impacted. We’ll walk through a scenario where an automated check flags a storage container as publicly accessible after a deployment, and you’ll practice a response sequence that preserves evidence, quickly restricts access, and evaluates whether access occurred before the fix. You’ll also cover operational pitfalls like “fixing” by deleting logs or changing too many settings at once, and how to coordinate with owners so the fix doesn’t break critical workflows. The episode equips you to choose the best next action under time pressure, which is exactly what many exam questions are really measuring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3a18ee4b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 46 — Securely access cloud services using private endpoints and scoped connectivity </title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46 — Securely access cloud services using private endpoints and scoped connectivity </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">67c0b168-d2d4-45c4-ba55-ce3eccee8ab3</guid>
      <link>https://share.transistor.fm/s/156810db</link>
      <description>
        <![CDATA[<p>This episode introduces private service endpoints as a connectivity pattern that reduces exposure by keeping service access off the public internet, and it ties the concept to GPCS exam objectives around network boundaries and secure access paths. You’ll define private endpoints in practical terms: a way for workloads and administrators to reach managed services through private network paths with controlled routing and access policies, rather than through public addresses. We’ll cover how scoped connectivity supports least privilege at the network layer, including restricting which subnets, workloads, and administrative paths can reach specific services, and how this reduces attack surface for credential stuffing, service probing, and opportunistic scanning. A scenario compares a database reached via public endpoint with IP allow rules versus a design using private endpoints and limited network paths, highlighting the operational and security tradeoffs you must reason through on the exam. You’ll also learn troubleshooting considerations like DNS resolution, routing mistakes, and how to validate that “private” truly means unreachable from public networks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces private service endpoints as a connectivity pattern that reduces exposure by keeping service access off the public internet, and it ties the concept to GPCS exam objectives around network boundaries and secure access paths. You’ll define private endpoints in practical terms: a way for workloads and administrators to reach managed services through private network paths with controlled routing and access policies, rather than through public addresses. We’ll cover how scoped connectivity supports least privilege at the network layer, including restricting which subnets, workloads, and administrative paths can reach specific services, and how this reduces attack surface for credential stuffing, service probing, and opportunistic scanning. A scenario compares a database reached via public endpoint with IP allow rules versus a design using private endpoints and limited network paths, highlighting the operational and security tradeoffs you must reason through on the exam. You’ll also learn troubleshooting considerations like DNS resolution, routing mistakes, and how to validate that “private” truly means unreachable from public networks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:10:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/156810db/0497dbfc.mp3" length="32761827" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>818</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces private service endpoints as a connectivity pattern that reduces exposure by keeping service access off the public internet, and it ties the concept to GPCS exam objectives around network boundaries and secure access paths. You’ll define private endpoints in practical terms: a way for workloads and administrators to reach managed services through private network paths with controlled routing and access policies, rather than through public addresses. We’ll cover how scoped connectivity supports least privilege at the network layer, including restricting which subnets, workloads, and administrative paths can reach specific services, and how this reduces attack surface for credential stuffing, service probing, and opportunistic scanning. A scenario compares a database reached via public endpoint with IP allow rules versus a design using private endpoints and limited network paths, highlighting the operational and security tradeoffs you must reason through on the exam. You’ll also learn troubleshooting considerations like DNS resolution, routing mistakes, and how to validate that “private” truly means unreachable from public networks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/156810db/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 47 — Decide when private service endpoints beat public exposure in real architectures </title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47 — Decide when private service endpoints beat public exposure in real architectures </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">256e0a80-23ae-453d-92db-139be68b3ada</guid>
      <link>https://share.transistor.fm/s/9c90eb40</link>
      <description>
        <![CDATA[<p>This episode teaches decision-making: when private endpoints are the right answer, when they are overkill, and how to justify the choice using risk and operational requirements, which is a common exam skill. You’ll evaluate factors like data sensitivity, threat model, required consumers, latency and routing complexity, incident response visibility, and the likelihood that “temporary” public exposure becomes permanent. We’ll discuss how public endpoints can be acceptable when access is narrowly controlled, strongly authenticated, and heavily monitored, but also how they increase opportunities for scanning, misconfiguration, and credential misuse to become direct service access. A scenario walks through a multi-team architecture where some consumers are on-prem and some are cloud-native; you’ll decide whether private endpoints, hybrid connectivity, or a controlled public endpoint best meets security and delivery needs, and you’ll identify the control set that makes your choice defensible. This prepares you for exam questions that ask for the “best” solution, not just a possible one. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches decision-making: when private endpoints are the right answer, when they are overkill, and how to justify the choice using risk and operational requirements, which is a common exam skill. You’ll evaluate factors like data sensitivity, threat model, required consumers, latency and routing complexity, incident response visibility, and the likelihood that “temporary” public exposure becomes permanent. We’ll discuss how public endpoints can be acceptable when access is narrowly controlled, strongly authenticated, and heavily monitored, but also how they increase opportunities for scanning, misconfiguration, and credential misuse to become direct service access. A scenario walks through a multi-team architecture where some consumers are on-prem and some are cloud-native; you’ll decide whether private endpoints, hybrid connectivity, or a controlled public endpoint best meets security and delivery needs, and you’ll identify the control set that makes your choice defensible. This prepares you for exam questions that ask for the “best” solution, not just a possible one. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:11:12 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9c90eb40/26eb04ca.mp3" length="32385667" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>809</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches decision-making: when private endpoints are the right answer, when they are overkill, and how to justify the choice using risk and operational requirements, which is a common exam skill. You’ll evaluate factors like data sensitivity, threat model, required consumers, latency and routing complexity, incident response visibility, and the likelihood that “temporary” public exposure becomes permanent. We’ll discuss how public endpoints can be acceptable when access is narrowly controlled, strongly authenticated, and heavily monitored, but also how they increase opportunities for scanning, misconfiguration, and credential misuse to become direct service access. A scenario walks through a multi-team architecture where some consumers are on-prem and some are cloud-native; you’ll decide whether private endpoints, hybrid connectivity, or a controlled public endpoint best meets security and delivery needs, and you’ll identify the control set that makes your choice defensible. This prepares you for exam questions that ask for the “best” solution, not just a possible one. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9c90eb40/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 48 — Harden remote administrative access without leaving durable attack surfaces</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48 — Harden remote administrative access without leaving durable attack surfaces</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4bce91b6-adf1-46e4-9725-e8d41e632d95</guid>
      <link>https://share.transistor.fm/s/1dfee223</link>
      <description>
        <![CDATA[<p>This episode focuses on remote administrative access as a high-risk pathway that must be engineered to be both secure and sustainable, a frequent theme on the GPCS exam when questions involve management interfaces and privileged actions. You’ll define administrative access surfaces such as management consoles, remote shells, bastion-style access points, and privileged APIs, then connect them to attacker goals like credential theft, session hijacking, and persistence through access tooling. We’ll cover hardening principles including minimizing exposed endpoints, requiring strong authentication, limiting session duration, reducing standing privilege, and ensuring administrative actions are logged with clear attribution. A scenario follows an engineer who needs emergency access from outside a trusted office network; you’ll design a hardened access path that avoids “temporary open” firewall rules, prevents credential reuse, and preserves audit evidence without blocking urgent operations. You’ll also learn common missteps, such as leaving admin ports open, relying on shared accounts, and failing to validate that access paths are actually restricted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on remote administrative access as a high-risk pathway that must be engineered to be both secure and sustainable, a frequent theme on the GPCS exam when questions involve management interfaces and privileged actions. You’ll define administrative access surfaces such as management consoles, remote shells, bastion-style access points, and privileged APIs, then connect them to attacker goals like credential theft, session hijacking, and persistence through access tooling. We’ll cover hardening principles including minimizing exposed endpoints, requiring strong authentication, limiting session duration, reducing standing privilege, and ensuring administrative actions are logged with clear attribution. A scenario follows an engineer who needs emergency access from outside a trusted office network; you’ll design a hardened access path that avoids “temporary open” firewall rules, prevents credential reuse, and preserves audit evidence without blocking urgent operations. You’ll also learn common missteps, such as leaving admin ports open, relying on shared accounts, and failing to validate that access paths are actually restricted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:12:08 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1dfee223/217a44ea.mp3" length="30947876" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>773</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on remote administrative access as a high-risk pathway that must be engineered to be both secure and sustainable, a frequent theme on the GPCS exam when questions involve management interfaces and privileged actions. You’ll define administrative access surfaces such as management consoles, remote shells, bastion-style access points, and privileged APIs, then connect them to attacker goals like credential theft, session hijacking, and persistence through access tooling. We’ll cover hardening principles including minimizing exposed endpoints, requiring strong authentication, limiting session duration, reducing standing privilege, and ensuring administrative actions are logged with clear attribution. A scenario follows an engineer who needs emergency access from outside a trusted office network; you’ll design a hardened access path that avoids “temporary open” firewall rules, prevents credential reuse, and preserves audit evidence without blocking urgent operations. You’ll also learn common missteps, such as leaving admin ports open, relying on shared accounts, and failing to validate that access paths are actually restricted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1dfee223/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 49 — Reduce admin compromise risk using strong authentication and access constraints</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49 — Reduce admin compromise risk using strong authentication and access constraints</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1888cb83-3665-4728-adbd-ea5ecfe65239</guid>
      <link>https://share.transistor.fm/s/0812e8c9</link>
      <description>
        <![CDATA[<p>This episode explains how to reduce privileged account compromise by combining strong authentication with constraints that limit what an attacker can do even if they capture a credential, aligning with exam questions that emphasize layered controls. You’ll define strong authentication in practice, including MFA design choices, phishing-resistant approaches conceptually, and the importance of reauthentication triggers for privileged actions and sensitive changes. We’ll connect authentication to access constraints such as conditional access, time-bound elevation, scoped roles, and session limits, showing how these controls reduce replay and make unauthorized access harder to sustain. A scenario explores a compromised admin password that would normally lead to immediate environment takeover; you’ll apply controls that force additional verification, restrict where sessions can originate, and limit available actions so the attacker’s window is narrow and observable. You’ll also cover operational concerns like preventing lockouts, maintaining break-glass access responsibly, and ensuring logs can prove who did what during high-impact administrative work. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to reduce privileged account compromise by combining strong authentication with constraints that limit what an attacker can do even if they capture a credential, aligning with exam questions that emphasize layered controls. You’ll define strong authentication in practice, including MFA design choices, phishing-resistant approaches conceptually, and the importance of reauthentication triggers for privileged actions and sensitive changes. We’ll connect authentication to access constraints such as conditional access, time-bound elevation, scoped roles, and session limits, showing how these controls reduce replay and make unauthorized access harder to sustain. A scenario explores a compromised admin password that would normally lead to immediate environment takeover; you’ll apply controls that force additional verification, restrict where sessions can originate, and limit available actions so the attacker’s window is narrow and observable. You’ll also cover operational concerns like preventing lockouts, maintaining break-glass access responsibly, and ensuring logs can prove who did what during high-impact administrative work. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:12:33 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0812e8c9/baca3015.mp3" length="31042969" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>775</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to reduce privileged account compromise by combining strong authentication with constraints that limit what an attacker can do even if they capture a credential, aligning with exam questions that emphasize layered controls. You’ll define strong authentication in practice, including MFA design choices, phishing-resistant approaches conceptually, and the importance of reauthentication triggers for privileged actions and sensitive changes. We’ll connect authentication to access constraints such as conditional access, time-bound elevation, scoped roles, and session limits, showing how these controls reduce replay and make unauthorized access harder to sustain. A scenario explores a compromised admin password that would normally lead to immediate environment takeover; you’ll apply controls that force additional verification, restrict where sessions can originate, and limit available actions so the attacker’s window is narrow and observable. You’ll also cover operational concerns like preventing lockouts, maintaining break-glass access responsibly, and ensuring logs can prove who did what during high-impact administrative work. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0812e8c9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 50 — Restrict administrative paths to trusted networks while keeping operations moving </title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50 — Restrict administrative paths to trusted networks while keeping operations moving </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69d1e99a-9e82-4868-a0e0-94174d138680</guid>
      <link>https://share.transistor.fm/s/42f22d25</link>
      <description>
        <![CDATA[<p>This episode teaches how to restrict administrative access to trusted network paths without creating brittle processes that teams will bypass, a real-world balancing act that the GPCS exam often encodes in “best answer” choices. You’ll define trusted networks in functional terms—controlled egress, known ingress points, monitored routes, and managed devices—then connect those constraints to administrative interfaces that should never be broadly reachable. We’ll discuss design patterns such as centralized access points, segmentation between user networks and admin networks, and explicit allow paths for critical operations, along with the verification steps that prove restrictions are working. A scenario walks through a distributed operations team that needs reliable access during incidents; you’ll implement network restrictions, pair them with strong identity controls, and ensure the process is usable enough that engineers do not resort to permanent exceptions. The episode closes by showing how to document and test these restrictions so they remain enforceable through change, audits, and outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to restrict administrative access to trusted network paths without creating brittle processes that teams will bypass, a real-world balancing act that the GPCS exam often encodes in “best answer” choices. You’ll define trusted networks in functional terms—controlled egress, known ingress points, monitored routes, and managed devices—then connect those constraints to administrative interfaces that should never be broadly reachable. We’ll discuss design patterns such as centralized access points, segmentation between user networks and admin networks, and explicit allow paths for critical operations, along with the verification steps that prove restrictions are working. A scenario walks through a distributed operations team that needs reliable access during incidents; you’ll implement network restrictions, pair them with strong identity controls, and ensure the process is usable enough that engineers do not resort to permanent exceptions. The episode closes by showing how to document and test these restrictions so they remain enforceable through change, audits, and outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:12:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/42f22d25/9a9ce815.mp3" length="30506943" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>762</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to restrict administrative access to trusted network paths without creating brittle processes that teams will bypass, a real-world balancing act that the GPCS exam often encodes in “best answer” choices. You’ll define trusted networks in functional terms—controlled egress, known ingress points, monitored routes, and managed devices—then connect those constraints to administrative interfaces that should never be broadly reachable. We’ll discuss design patterns such as centralized access points, segmentation between user networks and admin networks, and explicit allow paths for critical operations, along with the verification steps that prove restrictions are working. A scenario walks through a distributed operations team that needs reliable access during incidents; you’ll implement network restrictions, pair them with strong identity controls, and ensure the process is usable enough that engineers do not resort to permanent exceptions. The episode closes by showing how to document and test these restrictions so they remain enforceable through change, audits, and outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/42f22d25/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 51 — Secure cloud application service platforms with hardened baseline configurations </title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51 — Secure cloud application service platforms with hardened baseline configurations </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">997d02f0-828d-4527-8af9-46f0f614ff16</guid>
      <link>https://share.transistor.fm/s/4c8d72c7</link>
      <description>
        <![CDATA[<p>This episode explains how managed cloud application platforms (such as app services, container platforms, and managed runtimes) concentrate risk in a few baseline settings that determine exposure, identity permissions, and logging quality, which is why the GPCS exam frequently tests “secure-by-default” configuration thinking. You’ll define what a hardened baseline is for managed application services, including secure network reachability, strong authentication and authorization, restricted administrative actions, safe configuration storage, and reliable audit logging. We’ll walk through an example where a team deploys an application service with permissive inbound access and broad runtime identity permissions, then show how a baseline would have constrained ingress, limited outbound privileges, and preserved visibility into configuration changes. You’ll also cover practical operational checks—confirming management endpoints are restricted, ensuring logs include both control-plane and data-plane activity, and validating that secrets are not embedded in app settings in a way that leaks through debugging or export workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how managed cloud application platforms (such as app services, container platforms, and managed runtimes) concentrate risk in a few baseline settings that determine exposure, identity permissions, and logging quality, which is why the GPCS exam frequently tests “secure-by-default” configuration thinking. You’ll define what a hardened baseline is for managed application services, including secure network reachability, strong authentication and authorization, restricted administrative actions, safe configuration storage, and reliable audit logging. We’ll walk through an example where a team deploys an application service with permissive inbound access and broad runtime identity permissions, then show how a baseline would have constrained ingress, limited outbound privileges, and preserved visibility into configuration changes. You’ll also cover practical operational checks—confirming management endpoints are restricted, ensuring logs include both control-plane and data-plane activity, and validating that secrets are not embedded in app settings in a way that leaks through debugging or export workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:13:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4c8d72c7/83dcb14a.mp3" length="28480884" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>711</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how managed cloud application platforms (such as app services, container platforms, and managed runtimes) concentrate risk in a few baseline settings that determine exposure, identity permissions, and logging quality, which is why the GPCS exam frequently tests “secure-by-default” configuration thinking. You’ll define what a hardened baseline is for managed application services, including secure network reachability, strong authentication and authorization, restricted administrative actions, safe configuration storage, and reliable audit logging. We’ll walk through an example where a team deploys an application service with permissive inbound access and broad runtime identity permissions, then show how a baseline would have constrained ingress, limited outbound privileges, and preserved visibility into configuration changes. You’ll also cover practical operational checks—confirming management endpoints are restricted, ensuring logs include both control-plane and data-plane activity, and validating that secrets are not embedded in app settings in a way that leaks through debugging or export workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4c8d72c7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 52 — Assess managed application services for misconfigurations attackers exploit first </title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52 — Assess managed application services for misconfigurations attackers exploit first </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b6c3a715-f9d4-4307-aff0-a187e803e85b</guid>
      <link>https://share.transistor.fm/s/34e4bf1c</link>
      <description>
        <![CDATA[<p>This episode trains you to assess managed application services the way attackers do, focusing on misconfigurations that create immediate compromise paths and often appear as “easy points” on the GPCS exam. You’ll learn the high-priority assessment questions: is the service publicly reachable when it shouldn’t be, are administrative settings overly permissive, does the runtime identity have broad access, are secrets exposed in configuration, and is logging sufficient to prove what happened during an incident. We’ll work through a scenario where an application platform is deployed quickly with default settings, and an attacker leverages open access plus weak auth controls to reach management features and pivot into data services. You’ll also practice interpreting ambiguous assessment results, such as cases where a service is private but still reachable through unintended network paths, or where identity permissions look narrow but include escalation actions that enable broader access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode trains you to assess managed application services the way attackers do, focusing on misconfigurations that create immediate compromise paths and often appear as “easy points” on the GPCS exam. You’ll learn the high-priority assessment questions: is the service publicly reachable when it shouldn’t be, are administrative settings overly permissive, does the runtime identity have broad access, are secrets exposed in configuration, and is logging sufficient to prove what happened during an incident. We’ll work through a scenario where an application platform is deployed quickly with default settings, and an attacker leverages open access plus weak auth controls to reach management features and pivot into data services. You’ll also practice interpreting ambiguous assessment results, such as cases where a service is private but still reachable through unintended network paths, or where identity permissions look narrow but include escalation actions that enable broader access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:13:43 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/34e4bf1c/2ca18372.mp3" length="28577016" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>714</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode trains you to assess managed application services the way attackers do, focusing on misconfigurations that create immediate compromise paths and often appear as “easy points” on the GPCS exam. You’ll learn the high-priority assessment questions: is the service publicly reachable when it shouldn’t be, are administrative settings overly permissive, does the runtime identity have broad access, are secrets exposed in configuration, and is logging sufficient to prove what happened during an incident. We’ll work through a scenario where an application platform is deployed quickly with default settings, and an attacker leverages open access plus weak auth controls to reach management features and pivot into data services. You’ll also practice interpreting ambiguous assessment results, such as cases where a service is private but still reachable through unintended network paths, or where identity permissions look narrow but include escalation actions that enable broader access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/34e4bf1c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 53 — Reduce control-plane risk by locking down service settings and permissions </title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53 — Reduce control-plane risk by locking down service settings and permissions </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d839897f-74c9-426e-be25-f34423cdd3c4</guid>
      <link>https://share.transistor.fm/s/1e14615f</link>
      <description>
        <![CDATA[<p>This episode focuses on control-plane risk: the danger that someone with access to service configuration can change behavior, expose data, disable protections, or create persistence without touching the application code, a core theme in GPCS-style “what matters most” questions. You’ll define the control plane versus the data plane, then map common control-plane actions to impact, such as modifying authentication settings, changing network exposure, altering logging, rotating or swapping identities, and injecting configuration that reroutes traffic or exfiltrates secrets. A scenario follows an attacker who gains access to a service administrator role and uses configuration changes to create stealthy persistence; you’ll practice selecting controls that limit who can change settings, require stronger verification for high-impact changes, and ensure changes are logged and reviewable. You’ll also learn operational guardrails like separating deploy roles from admin roles, scoping permissions to specific services, and validating that emergency access paths exist without granting permanent broad authority. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on control-plane risk: the danger that someone with access to service configuration can change behavior, expose data, disable protections, or create persistence without touching the application code, a core theme in GPCS-style “what matters most” questions. You’ll define the control plane versus the data plane, then map common control-plane actions to impact, such as modifying authentication settings, changing network exposure, altering logging, rotating or swapping identities, and injecting configuration that reroutes traffic or exfiltrates secrets. A scenario follows an attacker who gains access to a service administrator role and uses configuration changes to create stealthy persistence; you’ll practice selecting controls that limit who can change settings, require stronger verification for high-impact changes, and ensure changes are logged and reviewable. You’ll also learn operational guardrails like separating deploy roles from admin roles, scoping permissions to specific services, and validating that emergency access paths exist without granting permanent broad authority. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:14:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1e14615f/6353488c.mp3" length="42324725" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1057</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on control-plane risk: the danger that someone with access to service configuration can change behavior, expose data, disable protections, or create persistence without touching the application code, a core theme in GPCS-style “what matters most” questions. You’ll define the control plane versus the data plane, then map common control-plane actions to impact, such as modifying authentication settings, changing network exposure, altering logging, rotating or swapping identities, and injecting configuration that reroutes traffic or exfiltrates secrets. A scenario follows an attacker who gains access to a service administrator role and uses configuration changes to create stealthy persistence; you’ll practice selecting controls that limit who can change settings, require stronger verification for high-impact changes, and ensure changes are logged and reviewable. You’ll also learn operational guardrails like separating deploy roles from admin roles, scoping permissions to specific services, and validating that emergency access paths exist without granting permanent broad authority. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1e14615f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 54 — Build secure defaults for cloud application services that teams will keep </title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54 — Build secure defaults for cloud application services that teams will keep </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4f51c642-614e-424a-a511-45961b9a4703</guid>
      <link>https://share.transistor.fm/s/3080ad7d</link>
      <description>
        <![CDATA[<p>This episode explains how to create secure defaults that are durable in real organizations, because the exam expects you to choose answers that reduce risk without relying on perfect human behavior. You’ll define secure defaults as baseline configurations applied consistently through templates, policies, and deployment pipelines, so teams inherit safe choices automatically and exceptions become explicit and reviewable. We’ll cover what defaults matter most for application services: minimizing public exposure, enforcing strong authentication, restricting runtime identity permissions, protecting configuration and secrets, enabling useful logs, and preventing risky administrative features from being enabled casually. A scenario compares two teams: one that hardens services manually after deployment and repeatedly misses settings under time pressure, and another that bakes defaults into deployment patterns so every new service starts hardened. You’ll also learn how to design exceptions that do not become permanent drift, including time limits, compensating controls, and evidence that the exception was approved and monitored. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to create secure defaults that are durable in real organizations, because the exam expects you to choose answers that reduce risk without relying on perfect human behavior. You’ll define secure defaults as baseline configurations applied consistently through templates, policies, and deployment pipelines, so teams inherit safe choices automatically and exceptions become explicit and reviewable. We’ll cover what defaults matter most for application services: minimizing public exposure, enforcing strong authentication, restricting runtime identity permissions, protecting configuration and secrets, enabling useful logs, and preventing risky administrative features from being enabled casually. A scenario compares two teams: one that hardens services manually after deployment and repeatedly misses settings under time pressure, and another that bakes defaults into deployment patterns so every new service starts hardened. You’ll also learn how to design exceptions that do not become permanent drift, including time limits, compensating controls, and evidence that the exception was approved and monitored. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:14:45 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3080ad7d/05ada36f.mp3" length="49021474" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1225</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to create secure defaults that are durable in real organizations, because the exam expects you to choose answers that reduce risk without relying on perfect human behavior. You’ll define secure defaults as baseline configurations applied consistently through templates, policies, and deployment pipelines, so teams inherit safe choices automatically and exceptions become explicit and reviewable. We’ll cover what defaults matter most for application services: minimizing public exposure, enforcing strong authentication, restricting runtime identity permissions, protecting configuration and secrets, enabling useful logs, and preventing risky administrative features from being enabled casually. A scenario compares two teams: one that hardens services manually after deployment and repeatedly misses settings under time pressure, and another that bakes defaults into deployment patterns so every new service starts hardened. You’ll also learn how to design exceptions that do not become permanent drift, including time limits, compensating controls, and evidence that the exception was approved and monitored. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3080ad7d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 55 — Verify hardened configurations remain stable through updates and team changes </title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55 — Verify hardened configurations remain stable through updates and team changes </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">29a002a0-d473-4d89-9596-bf344d8cbe07</guid>
      <link>https://share.transistor.fm/s/1de7f377</link>
      <description>
        <![CDATA[<p>This episode teaches configuration stability as a security requirement, because managed platforms change through provider updates, feature toggles, and team-driven modifications, and the GPCS exam often tests continuous validation rather than one-time setup. You’ll define drift for managed application services, including settings that silently revert, new defaults introduced by platform updates, and permission creep caused by role reuse or new operational tooling. We’ll walk through a scenario where a platform update changes a networking or authentication behavior and a previously hardened service becomes reachable in an unexpected way, then you’ll practice building verification routines that catch the change quickly. You’ll also cover best practices like baseline comparisons, change alerts on high-impact settings, periodic access reviews for service administrators, and validating logs still capture control-plane changes and runtime access patterns. The goal is to ensure your hardening remains true over time, not just true on day one, which is both exam-relevant and operationally critical. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches configuration stability as a security requirement, because managed platforms change through provider updates, feature toggles, and team-driven modifications, and the GPCS exam often tests continuous validation rather than one-time setup. You’ll define drift for managed application services, including settings that silently revert, new defaults introduced by platform updates, and permission creep caused by role reuse or new operational tooling. We’ll walk through a scenario where a platform update changes a networking or authentication behavior and a previously hardened service becomes reachable in an unexpected way, then you’ll practice building verification routines that catch the change quickly. You’ll also cover best practices like baseline comparisons, change alerts on high-impact settings, periodic access reviews for service administrators, and validating logs still capture control-plane changes and runtime access patterns. The goal is to ensure your hardening remains true over time, not just true on day one, which is both exam-relevant and operationally critical. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:15:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1de7f377/70e2d494.mp3" length="45435392" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1135</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches configuration stability as a security requirement, because managed platforms change through provider updates, feature toggles, and team-driven modifications, and the GPCS exam often tests continuous validation rather than one-time setup. You’ll define drift for managed application services, including settings that silently revert, new defaults introduced by platform updates, and permission creep caused by role reuse or new operational tooling. We’ll walk through a scenario where a platform update changes a networking or authentication behavior and a previously hardened service becomes reachable in an unexpected way, then you’ll practice building verification routines that catch the change quickly. You’ll also cover best practices like baseline comparisons, change alerts on high-impact settings, periodic access reviews for service administrators, and validating logs still capture control-plane changes and runtime access patterns. The goal is to ensure your hardening remains true over time, not just true on day one, which is both exam-relevant and operationally critical. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1de7f377/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 56 — Secure serverless architectures by understanding their real attack surfaces </title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56 — Secure serverless architectures by understanding their real attack surfaces </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ca641b37-a4cb-4761-92b6-d3bdb005ed7f</guid>
      <link>https://share.transistor.fm/s/111a5fea</link>
      <description>
        <![CDATA[<p>This episode introduces serverless security by focusing on what changes compared to traditional compute: you manage less infrastructure, but you rely more heavily on identity, event inputs, and managed service integrations, which the GPCS exam treats as primary attack surfaces. You’ll define serverless functions, managed runtimes, and event-driven execution, then map the real risks: overly permissive function identities, exposed invocation paths, unsafe dependencies, secrets in environment variables, and weak logging that hides short-lived execution. We’ll use a scenario where a function is triggered by an external-facing event source and processes untrusted input, and you’ll trace how attackers can exploit input handling to access sensitive data or misuse downstream permissions. You’ll also learn how to think about boundaries in serverless: what the function can reach, what can reach the function, and what evidence exists to prove how it was used during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces serverless security by focusing on what changes compared to traditional compute: you manage less infrastructure, but you rely more heavily on identity, event inputs, and managed service integrations, which the GPCS exam treats as primary attack surfaces. You’ll define serverless functions, managed runtimes, and event-driven execution, then map the real risks: overly permissive function identities, exposed invocation paths, unsafe dependencies, secrets in environment variables, and weak logging that hides short-lived execution. We’ll use a scenario where a function is triggered by an external-facing event source and processes untrusted input, and you’ll trace how attackers can exploit input handling to access sensitive data or misuse downstream permissions. You’ll also learn how to think about boundaries in serverless: what the function can reach, what can reach the function, and what evidence exists to prove how it was used during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:15:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/111a5fea/7bd64bd7.mp3" length="36567339" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>914</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces serverless security by focusing on what changes compared to traditional compute: you manage less infrastructure, but you rely more heavily on identity, event inputs, and managed service integrations, which the GPCS exam treats as primary attack surfaces. You’ll define serverless functions, managed runtimes, and event-driven execution, then map the real risks: overly permissive function identities, exposed invocation paths, unsafe dependencies, secrets in environment variables, and weak logging that hides short-lived execution. We’ll use a scenario where a function is triggered by an external-facing event source and processes untrusted input, and you’ll trace how attackers can exploit input handling to access sensitive data or misuse downstream permissions. You’ll also learn how to think about boundaries in serverless: what the function can reach, what can reach the function, and what evidence exists to prove how it was used during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/111a5fea/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 57 — Assess serverless environments for misconfigurations that enable takeover </title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57 — Assess serverless environments for misconfigurations that enable takeover </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0a1a7630-895f-4d3c-87ae-de5f6ce52183</guid>
      <link>https://share.transistor.fm/s/eaa3f1c3</link>
      <description>
        <![CDATA[<p>This episode focuses on assessing serverless deployments for the misconfigurations that enable compromise quickly, matching exam questions that ask you to identify the highest-impact weakness in an event-driven design. You’ll define the main assessment targets: function permissions, trigger exposure, environment configuration, dependency integrity, and observability, then learn how a single misconfiguration can turn a low-risk function into a control-plane bridge. A scenario follows a function with a broad role that can modify identity or storage services; an attacker gains invocation capability and uses the function’s permissions to pivot into wider cloud access. You’ll practice assessment steps that separate “code flaw” from “platform misconfiguration,” such as checking whether invocation is authenticated, whether triggers are constrained, whether the role can assume other roles, and whether logs capture invocation source and downstream API calls. The outcome is a repeatable assessment approach that applies across providers and helps you eliminate distractors on the exam. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on assessing serverless deployments for the misconfigurations that enable compromise quickly, matching exam questions that ask you to identify the highest-impact weakness in an event-driven design. You’ll define the main assessment targets: function permissions, trigger exposure, environment configuration, dependency integrity, and observability, then learn how a single misconfiguration can turn a low-risk function into a control-plane bridge. A scenario follows a function with a broad role that can modify identity or storage services; an attacker gains invocation capability and uses the function’s permissions to pivot into wider cloud access. You’ll practice assessment steps that separate “code flaw” from “platform misconfiguration,” such as checking whether invocation is authenticated, whether triggers are constrained, whether the role can assume other roles, and whether logs capture invocation source and downstream API calls. The outcome is a repeatable assessment approach that applies across providers and helps you eliminate distractors on the exam. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:16:13 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/eaa3f1c3/d5ec47bc.mp3" length="35508853" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>887</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on assessing serverless deployments for the misconfigurations that enable compromise quickly, matching exam questions that ask you to identify the highest-impact weakness in an event-driven design. You’ll define the main assessment targets: function permissions, trigger exposure, environment configuration, dependency integrity, and observability, then learn how a single misconfiguration can turn a low-risk function into a control-plane bridge. A scenario follows a function with a broad role that can modify identity or storage services; an attacker gains invocation capability and uses the function’s permissions to pivot into wider cloud access. You’ll practice assessment steps that separate “code flaw” from “platform misconfiguration,” such as checking whether invocation is authenticated, whether triggers are constrained, whether the role can assume other roles, and whether logs capture invocation source and downstream API calls. The outcome is a repeatable assessment approach that applies across providers and helps you eliminate distractors on the exam. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/eaa3f1c3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 58 — Harden serverless functions to block persistence, reinfection, and silent reuse </title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58 — Harden serverless functions to block persistence, reinfection, and silent reuse </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef10cd99-8962-4699-9a67-56e105b26694</guid>
      <link>https://share.transistor.fm/s/2235f984</link>
      <description>
        <![CDATA[<p>This episode explains hardening strategies for serverless functions with a focus on attacker goals that are easy to miss: persistence through configuration changes, reinfection through supply chain or deployment paths, and silent reuse of compromised identities or triggers. You’ll define persistence in serverless terms, including modified environment variables, altered triggers, injected dependencies, or deployment pipeline abuse that reintroduces malicious changes after cleanup. We’ll walk through a scenario where a function is cleaned up after suspicious activity, but the attacker retains access by modifying a trigger or redeploying through a compromised automation identity, and you’ll design controls that prevent recurrence. You’ll learn best practices such as restricting who can change function configuration, locking down deployment roles, limiting outbound access, using short-lived credentials where possible, and ensuring logs can correlate invocations to configuration states at the time of execution. The emphasis is on making serverless security durable against repeated attempts, which is both operationally realistic and exam-aligned. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains hardening strategies for serverless functions with a focus on attacker goals that are easy to miss: persistence through configuration changes, reinfection through supply chain or deployment paths, and silent reuse of compromised identities or triggers. You’ll define persistence in serverless terms, including modified environment variables, altered triggers, injected dependencies, or deployment pipeline abuse that reintroduces malicious changes after cleanup. We’ll walk through a scenario where a function is cleaned up after suspicious activity, but the attacker retains access by modifying a trigger or redeploying through a compromised automation identity, and you’ll design controls that prevent recurrence. You’ll learn best practices such as restricting who can change function configuration, locking down deployment roles, limiting outbound access, using short-lived credentials where possible, and ensuring logs can correlate invocations to configuration states at the time of execution. The emphasis is on making serverless security durable against repeated attempts, which is both operationally realistic and exam-aligned. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:16:39 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2235f984/58a55e30.mp3" length="42879576" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1071</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains hardening strategies for serverless functions with a focus on attacker goals that are easy to miss: persistence through configuration changes, reinfection through supply chain or deployment paths, and silent reuse of compromised identities or triggers. You’ll define persistence in serverless terms, including modified environment variables, altered triggers, injected dependencies, or deployment pipeline abuse that reintroduces malicious changes after cleanup. We’ll walk through a scenario where a function is cleaned up after suspicious activity, but the attacker retains access by modifying a trigger or redeploying through a compromised automation identity, and you’ll design controls that prevent recurrence. You’ll learn best practices such as restricting who can change function configuration, locking down deployment roles, limiting outbound access, using short-lived credentials where possible, and ensuring logs can correlate invocations to configuration states at the time of execution. The emphasis is on making serverless security durable against repeated attempts, which is both operationally realistic and exam-aligned. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2235f984/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 59 — Prevent serverless privilege overreach with tight identity and resource scopes </title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59 — Prevent serverless privilege overreach with tight identity and resource scopes </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8451396e-7be7-4f70-bd35-823aea2ef471</guid>
      <link>https://share.transistor.fm/s/e5bbaf2b</link>
      <description>
        <![CDATA[<p>This episode focuses on least privilege for serverless workloads, because functions often start small but accumulate permissions as teams add features, and the GPCS exam regularly tests whether you can spot privilege overreach hidden behind “it’s just a function.” You’ll define function identity, permission scope, and resource boundaries, then learn how to map each function’s actions to the smallest set of allowed operations on the smallest set of resources. We’ll cover common overreach patterns such as granting broad access to storage, messaging, or key services “for convenience,” permissions that allow role assumption into stronger identities, and policies that include wildcard actions or resources that expand over time. A scenario follows a function that only needs to read from one queue and write to one database, but is given sweeping permissions that enable lateral movement and data access across environments; you’ll tighten identity scope and validate the function still performs its job while escalation paths fail. This prepares you for exam questions that ask for the best permission design and for real engineering reviews where security must not break reliability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on least privilege for serverless workloads, because functions often start small but accumulate permissions as teams add features, and the GPCS exam regularly tests whether you can spot privilege overreach hidden behind “it’s just a function.” You’ll define function identity, permission scope, and resource boundaries, then learn how to map each function’s actions to the smallest set of allowed operations on the smallest set of resources. We’ll cover common overreach patterns such as granting broad access to storage, messaging, or key services “for convenience,” permissions that allow role assumption into stronger identities, and policies that include wildcard actions or resources that expand over time. A scenario follows a function that only needs to read from one queue and write to one database, but is given sweeping permissions that enable lateral movement and data access across environments; you’ll tighten identity scope and validate the function still performs its job while escalation paths fail. This prepares you for exam questions that ask for the best permission design and for real engineering reviews where security must not break reliability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:17:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e5bbaf2b/96090ec5.mp3" length="37648814" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>941</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on least privilege for serverless workloads, because functions often start small but accumulate permissions as teams add features, and the GPCS exam regularly tests whether you can spot privilege overreach hidden behind “it’s just a function.” You’ll define function identity, permission scope, and resource boundaries, then learn how to map each function’s actions to the smallest set of allowed operations on the smallest set of resources. We’ll cover common overreach patterns such as granting broad access to storage, messaging, or key services “for convenience,” permissions that allow role assumption into stronger identities, and policies that include wildcard actions or resources that expand over time. A scenario follows a function that only needs to read from one queue and write to one database, but is given sweeping permissions that enable lateral movement and data access across environments; you’ll tighten identity scope and validate the function still performs its job while escalation paths fail. This prepares you for exam questions that ask for the best permission design and for real engineering reviews where security must not break reliability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e5bbaf2b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 60 — Secure serverless event triggers so trusted inputs cannot be quietly replaced </title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Episode 60 — Secure serverless event triggers so trusted inputs cannot be quietly replaced </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">074b79cf-d903-46cf-bc3c-3459b06d310c</guid>
      <link>https://share.transistor.fm/s/ed542813</link>
      <description>
        <![CDATA[<p>This episode explains why event triggers are a primary trust boundary in serverless architectures, because whoever controls the trigger often controls when and how your function executes, and the GPCS exam expects you to reason about trusted inputs and integrity. You’ll define triggers broadly—HTTP endpoints, message queues, storage events, schedules, and integration events—and then map how trigger misconfiguration can allow unauthorized invocation, replay, or substitution of “trusted” events with attacker-controlled payloads. We’ll walk through a scenario where a function is designed to run only on internal events, but a trigger configuration change or permissive access policy allows external actors to invoke it, leading to data access through the function’s permissions. You’ll learn best practices such as authenticating and authorizing invocation, restricting who can modify trigger configuration, validating event source identity, and logging both the trigger source and downstream actions so investigations can prove cause and effect. The goal is to ensure the function’s execution path remains trustworthy even as teams evolve event routing over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why event triggers are a primary trust boundary in serverless architectures, because whoever controls the trigger often controls when and how your function executes, and the GPCS exam expects you to reason about trusted inputs and integrity. You’ll define triggers broadly—HTTP endpoints, message queues, storage events, schedules, and integration events—and then map how trigger misconfiguration can allow unauthorized invocation, replay, or substitution of “trusted” events with attacker-controlled payloads. We’ll walk through a scenario where a function is designed to run only on internal events, but a trigger configuration change or permissive access policy allows external actors to invoke it, leading to data access through the function’s permissions. You’ll learn best practices such as authenticating and authorizing invocation, restricting who can modify trigger configuration, validating event source identity, and logging both the trigger source and downstream actions so investigations can prove cause and effect. The goal is to ensure the function’s execution path remains trustworthy even as teams evolve event routing over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:17:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ed542813/b2e50504.mp3" length="38739686" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>968</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why event triggers are a primary trust boundary in serverless architectures, because whoever controls the trigger often controls when and how your function executes, and the GPCS exam expects you to reason about trusted inputs and integrity. You’ll define triggers broadly—HTTP endpoints, message queues, storage events, schedules, and integration events—and then map how trigger misconfiguration can allow unauthorized invocation, replay, or substitution of “trusted” events with attacker-controlled payloads. We’ll walk through a scenario where a function is designed to run only on internal events, but a trigger configuration change or permissive access policy allows external actors to invoke it, leading to data access through the function’s permissions. You’ll learn best practices such as authenticating and authorizing invocation, restricting who can modify trigger configuration, validating event source identity, and logging both the trigger source and downstream actions so investigations can prove cause and effect. The goal is to ensure the function’s execution path remains trustworthy even as teams evolve event routing over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ed542813/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Welcome to Certified: The GIAC GPCS Audio Course</title>
      <itunes:title>Welcome to Certified: The GIAC GPCS Audio Course</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">cfd20b5d-328f-46a4-8608-7da8386da70f</guid>
      <link>https://share.transistor.fm/s/3ed28c6e</link>
      <description>
        <![CDATA[<p>The podcast delivers practical cloud security guidance for professionals who have to ship real systems on real timelines. Episodes focus on the moves that prevent costly incidents: reducing accidental exposure, tightening identity and permissions, hardening serverless triggers, securing managed platforms, and building durable defaults that survive updates and team changes. The approach is technical and operational, with clear explanations that translate directly into repeatable patterns.</p><p>Each topic is designed to help you think like both a defender and an architect: what attackers exploit first, where misconfigurations hide, and how to constrain blast radius without slowing delivery. If you want deeper reference material, a companion book expands the same concepts in a structured format, and a flash cards book supports fast review and retention for day-to-day work, interviews, and certification prep.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The podcast delivers practical cloud security guidance for professionals who have to ship real systems on real timelines. Episodes focus on the moves that prevent costly incidents: reducing accidental exposure, tightening identity and permissions, hardening serverless triggers, securing managed platforms, and building durable defaults that survive updates and team changes. The approach is technical and operational, with clear explanations that translate directly into repeatable patterns.</p><p>Each topic is designed to help you think like both a defender and an architect: what attackers exploit first, where misconfigurations hide, and how to constrain blast radius without slowing delivery. If you want deeper reference material, a companion book expands the same concepts in a structured format, and a flash cards book supports fast review and retention for day-to-day work, interviews, and certification prep.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 16:18:01 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ed28c6e/027a66f9.mp3" length="611189" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>71</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The podcast delivers practical cloud security guidance for professionals who have to ship real systems on real timelines. Episodes focus on the moves that prevent costly incidents: reducing accidental exposure, tightening identity and permissions, hardening serverless triggers, securing managed platforms, and building durable defaults that survive updates and team changes. The approach is technical and operational, with clear explanations that translate directly into repeatable patterns.</p><p>Each topic is designed to help you think like both a defender and an architect: what attackers exploit first, where misconfigurations hide, and how to constrain blast radius without slowing delivery. If you want deeper reference material, a companion book expands the same concepts in a structured format, and a flash cards book supports fast review and retention for day-to-day work, interviews, and certification prep.</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud security, serverless security, IAM, least privilege, control plane security, cloud storage security, misconfiguration prevention, security baselines, secure defaults, private endpoints, network segmentation, logging and monitoring, incident response, access controls, key management, secrets management, data exfiltration, anomaly detection, policy governance, change control, risk assessment, DevSecOps, identity governance, cloud hardening, security architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ed28c6e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
