“If an attacker finds an access key, there’s no other way to find if it’s useful other than to use the access key. One important property is, while access keys might be the keys to the kingdom, they don’t have to be” Daniel Grzelak – Security Chief of Staff at Atlassian
Source: darkreading
About Daniel Grzelak
Skills
- Information Security Management
- Information Security
- Penetration Testing
- Application Security
- Management
- Incident Response
- Security Awareness
- Governance
- IT Strategy
- Business Strategy