Episode 8 — Detect and prevent metadata-driven privilege escalation across cloud workloads

This episode ties metadata abuse to privilege escalation outcomes so you can reason through exam questions that ask, “How does this become account compromise?” You’ll define escalation in cloud terms: pivoting from a workload identity to broader permissions, expanding access through overly powerful roles, and using newly gained credentials to enumerate, modify, or exfiltrate resources. We’ll emphasize prevention through least privilege on workload roles, tight scoping to required resources, and limiting what any single token can do, so even a successful metadata query has a small blast radius. We’ll also cover detection: identifying unusual token use patterns, unexpected calls from workloads to control planes, and evidence in logs that suggests credential reuse outside normal paths. A scenario explores a compromised application that uses harvested credentials to access storage and key management APIs, and how layered controls can interrupt the chain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 8 — Detect and prevent metadata-driven privilege escalation across cloud workloads
Broadcast by