Hey folks,
I recently presented ECScape at Black Hat USA and fwd:cloudsec.
Research into how ECS (EC2 launch type) handles IAM roles, and how those boundaries can be broken.
I wrote a two-part blog series that dives deep:
Would love to hear feedback, questions, or thoughts from the community - especially around how people think about IAM isolation in containerized environments.