Look for users and roles outside of expected admin groups that have excessive privileges. Especially with IAM rights but other restrictions on them.
Supercharging Security Hub: Part 4, Taking ActionIn our last post, we walked through the console and highlighted making the most of the Security Hub console and some tips and tricks to make it more useful.
Security Ops Waiting Game Remember in the olden days, when central IT ruled the land? If an application required fixes or new capabilities, the business put in a change order, and the IT folks