- A point worth repeating: "hiding" does not mean "securing". Never assume that just because your API is undocumented, or your admin portal URL is not published, or your jumpserver location is not known to anyone outside your team, no one can access it. https://securitylabs.datadoghq.com/articles/iamadmin-cloudtrail-bypass/ 3 comments aws
- AWS CloudTrail vulnerability: Undocumented API allows CloudTrail bypass | Datadog Security Labs https://securitylabs.datadoghq.com/articles/iamadmin-cloudtrail-bypass/ 7 comments aws
- AWS CloudTrail vulnerability: Undocumented API allows CloudTrail bypass | Datadog Security Labs https://securitylabs.datadoghq.com/articles/iamadmin-cloudtrail-bypass/ 4 comments netsec
Linking pages
- AWS had a dangerous undocumented API - Security - Cloud - iTnews https://www.itnews.com.au/news/aws-had-a-dangerous-undocumented-api-589864 1 comment
- GitHub - hashishrajan/cloud-security-vulnerabilities: List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Oracle Cloud, IBM Cloud etc https://github.com/hashishrajan/cloud-security-vulnerabilities 0 comments
Would you like to stay up to date with DevOps? Checkout DevOps
Weekly.
Related searches:
Search whole site: site:securitylabs.datadoghq.com
Search title: AWS CloudTrail vulnerability: Undocumented API allows CloudTrail bypass | Datadog Security Labs
See how to search.