Episode 92 — Social Engineering: why network controls still matter afterward
Social engineering appears in CloudNetX scenarios because it bypasses technical controls by manipulating people, and effective network design assumes that some users will eventually be tricked. This episode defines social engineering as the use of deception to obtain access, credentials, or actions that a system would otherwise block, and it highlights common tactics such as phishing, pretexting, and urgent requests that push users to bypass caution. The first paragraph focuses on the key architectural implication: network controls still matter after a user compromise, because segmentation, access restrictions, and monitoring determine whether a single compromised endpoint becomes a contained incident or a broad breach. It explains how scenarios often test containment logic, such as limiting lateral movement, restricting outbound pathways, and enforcing identity re-verification when behavior changes, rather than assuming that training alone prevents the problem.