misk@sopuli.xyz to Technology@lemmy.worldEnglish · 2 months agoRansomware crew abuses AWS native encryptionwww.theregister.comexternal-linkmessage-square4fedilinkarrow-up146arrow-down12
arrow-up144arrow-down1external-linkRansomware crew abuses AWS native encryptionwww.theregister.commisk@sopuli.xyz to Technology@lemmy.worldEnglish · 2 months agomessage-square4fedilink
minus-squarefutatorius@lemm.eelinkfedilinkEnglisharrow-up1·2 months agoAnd just to be clear, using IAM roles doesn’t require much effort either, even when you need to sync with an external auth provider such as AD (I know, ewww, but you have to live in the world as it is rather than the one you’d like it to be).
And just to be clear, using IAM roles doesn’t require much effort either, even when you need to sync with an external auth provider such as AD (I know, ewww, but you have to live in the world as it is rather than the one you’d like it to be).