c
Nov. 18, 2022, 6:42 p.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by Ermetic.
Written by Noam Dahan, Ermetic.
IAM433 has a good explanation of how and why permissions boundaries can be circumvented by resource policies. There’s a repeat tomorrow but it’s not recorded (chalk talk). This presentation should be made public and linked from the docs! #reInforce #awsreinforce #awswishlist— Ben Kehoe (@ben11kehoe) July 26, 2022At this year's AWS re:Inforce, session IAM433, AWS Sr. Solutions Architect Matt Luttrell and AWS Sr. Software Engi...

aws aws re:inforce iam policy re:inforce

More from cloudsecurityalliance.org / Cloud Security Alliance

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Incident Response Lead(IR)

@ Blue Yonder | Hyderabad

Comcast Cybersecurity: Privacy Operations Executive Director

@ Comcast | PA - Philadelphia, 1701 John F Kennedy Blvd