What happens if a secure token is provided to a trusted party that gets compromised
Take for example – AWS STS token or JWT tokens.
Let’s say node A got a token for accessing a resource of account X on behalf of account X. Access includes read/write privileges.
Let’s say few minutes later the node A got compromised.
Nothi… Continue reading What happens if a secure token is provided to a trusted party that gets compromised