Figure 10
«
Previous
|
Exploiting, detecting, and correcting IAM security misconfigurations
|
Next
»
Figure 10: Successful escalated privileged using assume-role.
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.