misk@sopuli.xyz to Technology@lemmy.worldEnglish · 2 days agoRansomware crew abuses AWS native encryptionwww.theregister.comexternal-linkmessage-square4fedilinkarrow-up146arrow-down12
arrow-up144arrow-down1external-linkRansomware crew abuses AWS native encryptionwww.theregister.commisk@sopuli.xyz to Technology@lemmy.worldEnglish · 2 days agomessage-square4fedilink
minus-squarefutatorius@lemm.eelinkfedilinkEnglisharrow-up1·1 day agoAnd just to be clear, using IAM roles doesn’t require much effort either, even when you need to sync with an external auth provider such as AD (I know, ewww, but you have to live in the world as it is rather than the one you’d like it to be).
And just to be clear, using IAM roles doesn’t require much effort either, even when you need to sync with an external auth provider such as AD (I know, ewww, but you have to live in the world as it is rather than the one you’d like it to be).