Using short-lived credentials is key but that’s not always possible depending on the situation and the clients involved. Detecting compromised keys sometimes has a long tail. aws.amazon.com/blogs/sec…

Jeffery Smith
@darkandnerdy
Using short-lived credentials is key but that’s not always possible depending on the situation and the clients involved. Detecting compromised keys sometimes has a long tail. aws.amazon.com/blogs/sec…