401 Class 16: Cloud Identity and Access Management (IAM) with AWS - nataliabdallah/codefellows-ops-reading-notes GitHub Wiki

Home | README.md | Portfolio | |

Reading Lessons Learned from the Capital One Data Breach (PDF)

What were the three commands used for the attack?

What misconfiguration of AWS components allowed the attacker to access sensitive data?

What are two of the AWS Governance practices that could have prevented such attack?