{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/origin-unit42.paloaltonetworks.com\/es-la\/","author_name":"Sheida Azimi","author_url":"https:\/\/origin-unit42.paloaltonetworks.com\/es-la\/author\/sheida-azimi\/","title":"\u00bfRoles aqu\u00ed? \u00bfRoles all\u00ed? \u00a1Roles en todas partes! Explorando la seguridad de AWS IAM Roles Anywhere","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"OypW0Z6gYx\"><a href=\"https:\/\/origin-unit42.paloaltonetworks.com\/es-la\/aws-roles-anywhere\/\">\u00bfRoles aqu\u00ed? \u00bfRoles all\u00ed? \u00a1Roles en todas partes! Explorando la seguridad de AWS IAM Roles Anywhere<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/origin-unit42.paloaltonetworks.com\/es-la\/aws-roles-anywhere\/embed\/#?secret=OypW0Z6gYx\" width=\"600\" height=\"338\" title=\"\u00ab\u00bfRoles aqu\u00ed? \u00bfRoles all\u00ed? \u00a1Roles en todas partes! Explorando la seguridad de AWS IAM Roles Anywhere\u00bb \u2014 Unit 42\" data-secret=\"OypW0Z6gYx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/origin-unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/06\/01_Cloud_cybersecurity_research_Overview_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"Este an\u00e1lisis del servicio Roles Anywhere de Amazon Web Services (AWS) examina los riesgos potenciales analizados tanto desde el punto de vista del defensor como del atacante. Este an\u00e1lisis del servicio Roles Anywhere de Amazon Web Services (AWS) examina los riesgos potenciales analizados tanto desde el punto de vista del defensor como del atacante."}