A company recently performed a security audit of all its internal applications developed in house. Certain business-critical applications that handle sensitive data were flagged because they use Amazon ES clusters that are open for read/write to a wider user group that intended.
Who is responsible for correcting the issue?
nicat
Highly Voted 2 years, 9 months agoMinisterKlaus
Highly Voted 2 years, 9 months agoalbert_kuo
Most Recent 11 months, 2 weeks agosapien45
2 years, 8 months agoYH2021
2 years, 8 months agokenkct
2 years, 8 months agojackdryan
2 years, 8 months agovob
2 years, 8 months agolgh9527
2 years, 9 months agoteosinh
2 years, 9 months agoprofessor
2 years, 9 months agogretch
2 years, 9 months ago