Menu
Sign In Pricing Add Podcast

Ruby Rogues

Secrets Management Best Practices and Tools - RUBY 655

886.06 - 907.872 Brian Vallelunga

If it has a secret in it, even in the history, it will get found and start getting exploited. So it's very quick. It's insanely quick. And then... The other side of it is now that they have access to your AWS, they can start scanning all your resources. Okay, what execution environments are set up? What databases are set up? Can I get access to those databases? How privileged is this credential?

0
💬 0

Comments

There are no comments yet.

Log in to comment.