Reply to post:

Yee-hacked! Fired Texan sysadmin goes rogue, trashes boot business

Dwarf Silver badge

An interesting point to add to the risk register for those partaking in cloudy stuff.

The usual approach of "deny physical access and remote access" is no longer enough to buy time whilst accounts are disabled.

Sure the AWS training courses includes information on Identity and Access Management (IAM), and what to do when the admin leaves, but how many would remember to do that on the day and how many of those would need a change request signed in triplicate to get privileged accounts changed "just in case something goes wrong", even though something worse can go wrong without the approved change.

As for the Muppet who did it, good luck in your new career, since nobody will touch you for IT roles now.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2019