"Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts"
"Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts"
Threat actors can use Amazon Web Services Security Token Service (AWS STS) to infiltrate cloud accounts and launch follow-on attacks. According to Red Canary researchers, the service allows threat actors to impersonate user identities and roles in cloud environments. AWS STS is a web service that lets users request temporary, limited-privilege credentials to access AWS resources without creating an AWS identity. These STS tokens have a validity period of 15 minutes to 36 hours.