Threat Actors can Leverage AWS STS to Infiltrate Cloud Accounts

According to the experts, to mitigate AWS token abuse, organizations should log CloudTrail event data, detect role-chaining events and MFA abuse, and rotate long-term IAM user access keys.

>>More