dfeldman,
@dfeldman@hachyderm.io avatar

One of the coolest security prototypes I've seen was a program that could automatically find attack paths given access control policies (like IAM roles or Kubernetes roles)

So if role X was compromised, and it shared resources with role Y, which shared resources with role Z, it would show that

This is definitely something that should exist (maybe as a company?)

littledetritus,
@littledetritus@geraffel.social avatar

@dfeldman cc @thomasfricke

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • DreamBathrooms
  • mdbf
  • tacticalgear
  • magazineikmin
  • thenastyranch
  • rosin
  • everett
  • Youngstown
  • khanakhh
  • slotface
  • ngwrru68w68
  • kavyap
  • cisconetworking
  • InstantRegret
  • JUstTest
  • osvaldo12
  • GTA5RPClips
  • ethstaker
  • tester
  • Durango
  • normalnudes
  • provamag3
  • modclub
  • cubers
  • Leos
  • megavids
  • anitta
  • lostlight
  • All magazines