Nov. 8, 2023, 2:34 p.m. | Chris Sciarrino

AWS Security Blog aws.amazon.com

Traditionally, applications or systems—defined as pieces of autonomous logic functioning without direct user interaction—have faced challenges associated with long-lived credentials such as access keys. In certain circumstances, long-lived credentials can increase operational overhead and the scope of impact in the event of an inadvertent disclosure. To help mitigate these risks and follow the best practice […]

access access keys advanced (300) applications authority autonomous aws aws identity and access management (iam) aws private certificate authority certificate certificate authority certificates challenges compliance credentials defined disclosure event iam iam roles iam roles anywhere identity impact issue keys logic multicloud operational private roles scope security security blog systems technical how-to

More from aws.amazon.com / AWS Security Blog

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India

Cyber Program Manager - CISO- United States – Remote

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Network Security Engineer (AEGIS)

@ Peraton | Virginia Beach, VA, United States

SC2022-002065 Cyber Security Incident Responder (NS) - MON 13 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Information Systems Security Engineer

@ Booz Allen Hamilton | USA, GA, Warner Robins (300 Park Pl Dr)