Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
detaro
on Oct 23, 2017
|
parent
|
context
|
favorite
| on:
AWS bastions and assume-role
So in a scenario where you can breach their AWS accounts, it would be a noticeable difficulty for you to discover that they use this pattern to work? I'm not very familiar with AWS, but that seems odd.
Consider applying for YC's Spring batch! Applications are open till Feb 11.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: