TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Deleting a compromised AWS Access Key isn't sufficient

2 点作者 gauravphoenix将近 8 年前

1 comment

for0one将近 8 年前
&quot;(The attacker) proceeds to create temporary security credentials using the AWS (STS) Security Token Service. These credentials are valid for a period of time ranging from 15 mins to 36 hours based on the parameters used when requesting the tokens. In this example, the attacker uses 36 hours.&quot;<p>I don&#x27;t use AWS often. Does AWS provide a way to receive notifications when AWS STS commands are run? Or do some admins setup syslogging to capture these events?
评论 #15029867 未加载