Threat Actors can Leverage AWS STS to Infiltrate Cloud Accounts
Threat Actors can Leverage AWS STS to Infiltrate Cloud Accounts
07 December 2023
According to the experts, to mitigate AWS token abuse, organizations should log CloudTrail event data, detect role-chaining events and MFA abuse, and rotate long-term IAM user access keys.