AWS CloudGoat and mitigation strategies: Part 5
AWS Cloudgoat and mitigation strategies Part 5 This is part 5 of the series on AWS Cloudgoat Scenarios and the mitigation strategies. This part of the article presumes that Cloudgoat has already been configured. Please refer to part 1 of this series to see how to install and configure Cloudgoat. Scenario 7: Stealing secrets using CloudBuild Description: Starting as the IAM user “Solo”, the attacker discovers...
Read More