Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655
Brian Vallelunga
If it has a secret in it, even in the history, it will get found and start getting exploited. So it's very quick. It's insanely quick. And then... The other side of it is now that they have access to your AWS, they can start scanning all your resources. Okay, what execution environments are set up? What databases are set up? Can I get access to those databases? How privileged is this credential?
0
💬
0
Comments
Log in to comment.
There are no comments yet.