![Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads](https://unit42.paloaltonetworks.com/wp-content/uploads/2020/10/word-image-9.png)
Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads
![How to use resource-based policies in the AWS Secrets Manager console to securely access secrets across AWS accounts | AWS Security Blog How to use resource-based policies in the AWS Secrets Manager console to securely access secrets across AWS accounts | AWS Security Blog](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2020/07/10/Resource-Based-Policies-Secrets-Manager-Figure-1.png)
How to use resource-based policies in the AWS Secrets Manager console to securely access secrets across AWS accounts | AWS Security Blog
![One-Stop IT Service Provider - How exactly to use resource-based policies within the AWS Secrets Supervisor console to securely accessibility secrets across AWS accounts One-Stop IT Service Provider - How exactly to use resource-based policies within the AWS Secrets Supervisor console to securely accessibility secrets across AWS accounts](https://i0.wp.com/www.infracom.com.sg/wp-content/uploads/2020/07/Resource-Based-Policies-Secrets-Manager-Figure-6.jpg?resize=640%2C379&ssl=1)
One-Stop IT Service Provider - How exactly to use resource-based policies within the AWS Secrets Supervisor console to securely accessibility secrets across AWS accounts
![How to use resource-based policies in the AWS Secrets Manager console to securely access secrets across AWS accounts | Noise How to use resource-based policies in the AWS Secrets Manager console to securely access secrets across AWS accounts | Noise](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2020/07/10/Resource-Based-Policies-Secrets-Manager-Figure-8.jpg)