Today, detection engineers and blue teamers are focused on cloud threat detection. However, are we thinking about these threats holistically?
There are many pathways that threat actors utilize to gain access to cloud resources. Among these are endpoints that contain various cloud credential material.
This cloud credential material - in the form of various files, tokens and cookies is often overlooked, with little visibility and telemetry generated.