Главная
Study mode:
on
1
Introduction
2
AWS Security Token Service
3
SAML Markup Language
4
API Assume Roll
5
Identity Provider
6
Slides
7
Setting up the Identity Provider
8
Copying the Identity Provider
9
API Integration
10
Static Access Keys
11
IAM Policy
12
AWS Octave
13
AWS Roles
14
MFA
15
Execution Style
16
Notes
17
Lessons Learned
18
Questions
Description:
Learn how to eliminate static AWS Access Keys and enhance cloud security in this 25-minute conference talk from BSidesSF 2020. Explore the AWS Security Token Service, SAML, and API Assume Role as Benjamin Hering guides you through his company's journey to implement short-lived credentials. Discover the step-by-step process of setting up an Identity Provider, configuring API integration, and creating IAM policies. Gain insights into AWS Octave, AWS Roles, and Multi-Factor Authentication implementation. Benefit from practical lessons learned and get answers to common questions about transitioning away from static access keys to improve your AWS environment's security posture.

How to Kill an AWS Access Key

Security BSides San Francisco
Add to list
0:00 / 0:00