We are heavily invested in AWS EC2, and we would like to maximize our usage with Cymulate. We are looking for specific assessments and scenarios we can run to reduce risks that arise from misconfiguration in the cloud, such as inadequate access restrictions, unencrypted private data (ex credentials), AWS AMI patching, secured lambda coding, etc.
Can you please assist?
Best answer by Anonymous
View original