Posts Tagged "IAM"

IAM Beyond AWS or Hacking Hacks, and the Hackers who Hack Them

How I built a system to impersonate the AWS metadata service on developer laptops, providing passwordless, expiring STS credentials linked to user identities via SSH key authentication.