Frontpage
Back
Navigation
Figure 17
«
Previous
|
Exploiting, detecting, and correcting IAM security misconfigurations
|
Next
»
Figure 17: CloudTrail attacker trail.