1 Answers
That’s a great resource, and I’m inclined to agree. Temporary credentials should definitely be considered as part of the incident response, and what needs to be done with concern for them, and revoking any outstanding access. Another thing I like in this article is how it mentions that you should also consider what applications will be affected by taking the credentials down (is it worth triggering an outage, depending on the vulnerability scope?), and why we make them inactive instead of just deleting them, in case it breaks something unforeseen.
Thanks for letting us know about this. I’ll forward it along to the instructor, and I’ve also added that blog post as a resource to the lecture.
Feedback can also be submitted directly to us through our Contact Support form, where one of our technical team members will respond and assess what we need to do to update our content
Hey! Nice answer! and thanks for the additional comment.