{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/","author_name":"Sheida Azimi","author_url":"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/author\/sheida-azimi\/","title":"Des r\u00f4les par ci, des r\u00f4les par l\u00e0, des r\u00f4les partout ! Explorons la s\u00e9curit\u00e9 d'AWS IAM Roles Anywhere","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qVO56u1AoM\"><a href=\"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/aws-roles-anywhere\/\">Des r\u00f4les par ci, des r\u00f4les par l\u00e0, des r\u00f4les partout ! Explorons la s\u00e9curit\u00e9 d'AWS IAM Roles Anywhere<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/aws-roles-anywhere\/embed\/#?secret=qVO56u1AoM\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Des r\u00f4les par ci, des r\u00f4les par l\u00e0, des r\u00f4les partout ! Explorons la s\u00e9curit\u00e9 d&#039;AWS IAM Roles Anywhere\u00a0\u00bb &#8212; Unit 42\" data-secret=\"qVO56u1AoM\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/origin-unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/06\/01_Cloud_cybersecurity_research_Overview_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"Cet aper\u00e7u du service\u00a0AWS Roles\u00a0Anywhere examine les risques potentiels tant du point de vue du d\u00e9fenseur que de celui de l\u2019attaquant. Cet aper\u00e7u du service\u00a0AWS Roles\u00a0Anywhere examine les risques potentiels tant du point de vue du d\u00e9fenseur que de celui de l\u2019attaquant."}