Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- [1] What is MFA?: https://aws.amazon.com/what-is/mfa/
- [2] Statistics on Disgruntled Employees: https://www.informationweek.com/cyber-resilience/75-of-insider-cyber-attacks-are-the-work-of-disgruntled-ex-employees-report
- [3] National Insider Threat Task Force: https://www.dni.gov/index.php/ncsc-how-we-work/ncsc-nittf
- [4] What is Privilege Creep?: https://heimdalsecurity.com/blog/what-is-privilege-creep-and-how-to-prevent-it/
- [5] Terraform, IaC: https://www.terraform.io/use-cases/infrastructure-as-code
- [6] AWS CloudFormation: https://aws.amazon.com/cloudformation/
- [7] Kubernetes Resources: https://kubernetes.io/docs/concepts/cluster-administration/manage-deployment/
- [8] Quick start with Helm: https://helm.sh/docs/intro/quickstart/
- [9] Multi-Party Authorization: https://en.wikipedia.org/wiki/Multi-party_authorization
- [10...