Published by Vologon at July 12, 2019 [ad_1] Performing tasks with root user credentials opens AWS to potentially catastrophic security vulnerabilities. Creating and managing access keys mitigates the risk. Image: marchmeena29, Getty Images/iStockphoto […]