AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Is There an Owner Identifiable?
When it comes to ownership, we're able to make some inferences. Who has axius and whoever has access could theoretically be the owner. It's a different kind of use case. Less is more proactive. But it's very forward thinking. Can we manage this configuration hygiene through automation and alert on at a low level, medium level? When these tags are missing, maybe tit's interstructure as code. And youd start think about all this stuff that could be in the blast radius of this incident. What dod kennedats, hoxt do, shared s s h keys, you know, all thi stuff. M, it turns into hours of investigation, especially