Frontpage
Back
Navigation
Figure 2
«
Previous
|
Exploiting, detecting, and correcting IAM security misconfigurations
|
Next image
»
Figure 2: Scenario 1: Creating a new policy version.