Cloud Security, Configuration management, Attack simulation, SOC

Using IaC to Establish & Analyze Secure Environments – Cesar Rodriguez – ASW #112

June 29, 2020

Sponsored By

Visit for more information!

Teams building Infrastructure as Code still need to ensure that the infrastructure deployed matches the code they created. Not only can IaC help establish secure environments, analyzing that code can help identify when environments have drifted from security baselines or even highlight when misconfigurations lead to exploitable vulns.

To learn more about Accurics, visit: for all the latest episodes!
Full Episode Show Notes

Using IaC to Establish & Analyze Secure Environments


[caption id="attachment_210" align="alignleft" width="120"]Matt Alderman Matt Alderman - CEO[/caption] [caption id="attachment_210" align="alignleft" width="120"]Mike Shema Mike Shema - Product Security Lead[/caption]


[caption id="attachment_210" align="alignleft" width="120"]Cesar Rodriguez Cesar Rodriguez - Head of Developer Advocacy [/caption]


  • Join the Security Weekly Mailing List & receive your invite to our community Discord server by visiting and clicking the button to join the list!
  • With all the recent changes to BlackHat and DefCon, we realized we can keep doing what we do best - host virtual podcasts! I’m proud to announce Hacker Summer Camp 2020, a Security Weekly Virtual, Live-Stream Event, August 3 - August 6, 2020. To reserve your slot now, visit:

[audio src=""]

prestitial ad