blog.ryandlane.com
Custom service to service authentication using IAM/KMS
Similar to abusing IAM and STS, we can also abuse IAM and KMS to let Amazon do our service-to-service authentication for us. Unlike STS, though, KMS is almost perfect for this use case. Let’s…