The Application Security Podcast cover image

Mazin Ahmed -- Terraform Security

The Application Security Podcast

00:00

Terfom

The way that terraform works is a thi sa to to day. I want to deploy in i tree bucket, and then i would write the codWould then have it applied through turform. The same machine would have access to all of them. So if you happen to land into the machine that is running terfom, then probably you go on the battle you have access to everything. And anything that is a secretor or key, or anything that is being received after the deployment to be used, should be there in the state file. Like essentiall, it should be ad menaxes.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app