Skip to content
This repository has been archived by the owner on Jan 3, 2025. It is now read-only.

Commit

Permalink
added get in touch seciton to blog
Browse files Browse the repository at this point in the history
  • Loading branch information
qt-pixels committed Aug 15, 2024
1 parent 40244a9 commit 1cc8daf
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion _posts/2023-06-20-leaking-credentials.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -169,4 +169,8 @@ There has been discussion of varying front-ends for our Credential Suppression t
We avoid the possibility of misuse of our Credential Suppression tool by implementing proper security on our AWS accounts. Adding another layer and API means we must also be experts on that layer, as well as possibly that layer's interactions with AWS.
I prefer to have the simplest understanding of what may occur during what is already an anomalous, and hopefully, rare event.

As well, introducing a front-end layer means there will be an API to access our tool. In that case, an attacker might write a robot that repeatedly invokes the tool before we can refresh our credentials again! Better to keep it simple.
As well, introducing a front-end layer means there will be an API to access our tool. In that case, an attacker might write a robot that repeatedly invokes the tool before we can refresh our credentials again! Better to keep it simple.

---

If you need help with your cloud security posture or set up, don't be shy and <a href="https://www.mechanicalrock.io/lets-get-started">get in touch</a>.

0 comments on commit 1cc8daf

Please sign in to comment.