Detecting Secrets to Reduce Attack Surface
In our last few articles, we focused on vulnerability scanning of hosts and containers in AWS ECS, Azure AKS, Google GKE, and Oracle OKE. In this post, we will discuss secrets management, another important aspect of cloud native security. We are releasing…