misk@sopuli.xyz to Technology@lemmy.worldEnglish · 1 day agoRansomware crew abuses AWS native encryptionwww.theregister.comexternal-linkmessage-square4fedilinkarrow-up145arrow-down12cross-posted to: cybersecurity
arrow-up143arrow-down1external-linkRansomware crew abuses AWS native encryptionwww.theregister.commisk@sopuli.xyz to Technology@lemmy.worldEnglish · 1 day agomessage-square4fedilinkcross-posted to: cybersecurity
minus-squarefutatorius@lemm.eelinkfedilinkEnglisharrow-up1·9 hours agoAnd just to be clear, using IAM roles doesn’t require much effort either, even when you need to sync with an external auth provider such as AD (I know, ewww, but you have to live in the world as it is rather than the one you’d like it to be).
And just to be clear, using IAM roles doesn’t require much effort either, even when you need to sync with an external auth provider such as AD (I know, ewww, but you have to live in the world as it is rather than the one you’d like it to be).