AWS Persistence
Techniques threat actors use to maintain persistence in an AWS environment
Generate IAM Access Keys from CloudShellCreating IAM Access KeysBackdoor an IAM RoleGenerating Temporary AWS Credentials from IAM UserGenerating Temporary Credentials from SSO Credentials File
Last updated
Was this helpful?