Who is responsible for correcting the issue?
A company recently performed a security audit of all its internal applications developed in house.Certain business-critical applications that handle sensitive data were flagged because they use Amazon ES clusters that are open for read/write to a wider user group that intended.Who is responsible for correcting the issue?Read More →