▲ | cyberax 4 days ago | |||||||
Regular individual systems that run the code inside the AWS generally do not have long-lived tokens. The credentials are ultimately _pushed_ to the systems running the services by a small set of highly secured and monitored privileged systems. You get to see that even with the regular public AWS/EC2. Instance roles are managed externally from the customers' points of view. | ||||||||
▲ | otabdeveloper4 3 days ago | parent [-] | |||||||
> highly secured and monitored privileged systems So, ultimately "keys to the castle" aka a long password? | ||||||||
|