![Active Defense - Dynamically Locking AWS Credentials to Your Environment | by William Bengtson | The Startup | Medium Active Defense - Dynamically Locking AWS Credentials to Your Environment | by William Bengtson | The Startup | Medium](https://miro.medium.com/max/1200/1*oj6o6mZbpY7cuxuMgfmnyw.png)
Active Defense - Dynamically Locking AWS Credentials to Your Environment | by William Bengtson | The Startup | Medium
![GitHub - bioteam/ec2userkeyd: Automatically provide EC2 users with personalized credentials via a local daemon. GitHub - bioteam/ec2userkeyd: Automatically provide EC2 users with personalized credentials via a local daemon.](https://raw.githubusercontent.com/bioteam/ec2userkeyd/b58a67577ceeff6a824997396be59ce7af21035e/ec2userkeyd-diagram.png)
GitHub - bioteam/ec2userkeyd: Automatically provide EC2 users with personalized credentials via a local daemon.
![Privilege Escalation in AWS Elastic Kubernetes Service (EKS) by compromising the instance role of worker nodes - Christophe Tafani-Dereeper Privilege Escalation in AWS Elastic Kubernetes Service (EKS) by compromising the instance role of worker nodes - Christophe Tafani-Dereeper](https://blog.christophetd.fr/wp-content/uploads/2020/08/k8s-matrix-annotated.png)
Privilege Escalation in AWS Elastic Kubernetes Service (EKS) by compromising the instance role of worker nodes - Christophe Tafani-Dereeper
![Deploy DataHub using AWS managed services and ingest metadata from AWS Glue and Amazon Redshift – Part 2 | AWS Big Data Blog Deploy DataHub using AWS managed services and ingest metadata from AWS Glue and Amazon Redshift – Part 2 | AWS Big Data Blog](https://d2908q01vomqb2.cloudfront.net/b6692ea5df920cad691c20319a6fffd7a4a766b8/2022/10/19/BDB-2277-arch-diag.jpg)
Deploy DataHub using AWS managed services and ingest metadata from AWS Glue and Amazon Redshift – Part 2 | AWS Big Data Blog
![Get started with automated metadata extraction using the AWS Media Analysis Solution | AWS Machine Learning Blog Get started with automated metadata extraction using the AWS Media Analysis Solution | AWS Machine Learning Blog](https://d2908q01vomqb2.cloudfront.net/f1f836cb4ea6efb2a0b1b99f41ad8b103eff4b59/2018/09/07/media-analysis-1.gif)
Get started with automated metadata extraction using the AWS Media Analysis Solution | AWS Machine Learning Blog
![Server Side Request Forgery (SSRF) and AWS EC2 instances after Instance Meta Data Service version 2(IMDSv2) | by Riyaz Walikar | Appsecco Server Side Request Forgery (SSRF) and AWS EC2 instances after Instance Meta Data Service version 2(IMDSv2) | by Riyaz Walikar | Appsecco](https://miro.medium.com/max/737/1*o1ld0Sn8T_edYs1NR8C9Aw.png)
Server Side Request Forgery (SSRF) and AWS EC2 instances after Instance Meta Data Service version 2(IMDSv2) | by Riyaz Walikar | Appsecco
![Detecting Server-Side Request Forgery Attacks on Amazon Web Services The ISSA Journal : February 2020 Detecting Server-Side Request Forgery Attacks on Amazon Web Services The ISSA Journal : February 2020](https://cdn.coverstand.com/1336/649364/article_assets/e398255f91e5780c93fea0627cc3a44756141e81.jpg)
Detecting Server-Side Request Forgery Attacks on Amazon Web Services The ISSA Journal : February 2020
![Managing your application metadata using AWS Service Catalog App Registry | AWS Cloud Operations & Migrations Blog Managing your application metadata using AWS Service Catalog App Registry | AWS Cloud Operations & Migrations Blog](https://d2908q01vomqb2.cloudfront.net/972a67c48192728a34979d9a35164c1295401b71/2022/01/06/scappregarc1.png)
Managing your application metadata using AWS Service Catalog App Registry | AWS Cloud Operations & Migrations Blog
![Getting started with Version 2 of AWS EC2 Instance Metadata service (IMDSv2) | by Sunesh Govindaraj | Appsecco Getting started with Version 2 of AWS EC2 Instance Metadata service (IMDSv2) | by Sunesh Govindaraj | Appsecco](https://miro.medium.com/max/660/1*exCbYWZGXnV4c4aqbYJkaw.png)