March 5, 2024, 11:27 a.m. | Emmanuel C Flint

DEV Community dev.to


Ideally, a good information security scheme has a series of factors that make it difficult for an unauthorized person to gain access to protected information or secrets. Unfortunately, if you have a default PEM file that you simply downloaded from your EC2 on AWS, you're only authenticating with something that you have. This means that if someone were to get a hold of your PEM file that person could use it to access your EC2 if they know its …

access aws default ec2 file good information information security key password pem private private key protect secrets security series unauthorized yubico

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States