all InfoSec news
Diving Deeply into IAM Policy Evaluation – Highlights from AWS re:Inforce IAM433
Nov. 18, 2022, 6:42 p.m. |
Cloud Security Alliance cloudsecurityalliance.org
Written by Noam Dahan, Ermetic.
IAM433 has a good explanation of how and why permissions boundaries can be circumvented by resource policies. There’s a repeat tomorrow but it’s not recorded (chalk talk). This presentation should be made public and linked from the docs! #reInforce #awsreinforce #awswishlist— Ben Kehoe (@ben11kehoe) July 26, 2022At this year's AWS re:Inforce, session IAM433, AWS Sr. Solutions Architect Matt Luttrell and AWS Sr. Software Engi...
More from cloudsecurityalliance.org / Cloud Security Alliance
Jobs in InfoSec / Cybersecurity
Sr. Product Manager
@ MixMode | Remote, US
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Incident Response Lead(IR)
@ Blue Yonder | Hyderabad
Comcast Cybersecurity: Privacy Operations Executive Director
@ Comcast | PA - Philadelphia, 1701 John F Kennedy Blvd