What happens if a secure token is provided to a trusted party that gets compromised

Take for example – AWS STS token or JWT tokens.
Let’s say node A got a token for accessing a resource of account X on behalf of account X. Access includes read/write privileges.
Let’s say few minutes later the node A got compromised.
Nothi… Continue reading What happens if a secure token is provided to a trusted party that gets compromised

What happens if a secure token is provided to a trusted party that gets compromised

Take for example – AWS STS token or JWT tokens.
Let’s say node A got a token for accessing a resource of account X on behalf of account X. Access includes read/write privileges.
Let’s say few minutes later the node A got compromised.
Nothi… Continue reading What happens if a secure token is provided to a trusted party that gets compromised

What are the recommended mechanism to securely distribute private keys to thousands of servers?

I am asking this question because in this article https://engineering.fb.com/security/delegated-credentials/ there is a sentence stating "We securely distribute private keys to the servers".
I am trying to understand how that is … Continue reading What are the recommended mechanism to securely distribute private keys to thousands of servers?

How to establish a secure channel with authenticated and authorized access to a remote entity

I have the following problem:

There are 3 parties A, B and X.
X is holding 2 entities on behalf of A and B.
A communicates with X to operate it’s own entity. B also communicates with X to operate it’s own entity.
Permissions could be … Continue reading How to establish a secure channel with authenticated and authorized access to a remote entity