Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Are you aware that you can associate an EC2 instance profile on a temporary basis with a role? And attach and detach them via api or on a schedule? Because if you do that, and you hack the machine (Linux, Windows or Mac not relevant...), but you don't have the role with the privileges you need, you are going nowhere.

https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_us...



Yeah, so that means the attacker has to wait for the next schedule. As I said, that's an advantage but I wouldn't classify it as a major win.

It's different if you use a different machine for the priviledged account. Then an attacker has to take over that second machine too. IMHO this is a mucher better concept, but also increases friction significantly.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: