Manage access to workloads and applications securely.
For applications running on AWS, you can use specific access controls to grant employees, applications, and devices the access they need to resources.
Security: AWS Identity
New vulnerabilities in Ubuntu
A new vulnerability emerges in the Linux kernel in the versions Ubuntu 14.04 LTS, Ubuntu 15.04 Vivid Velvet, Trusty Tahr. In each of these versions, two flaws were detected, which were identified by the users themselves. These flaws have already been remedied, but it is necessary to update the version for the implementation of these fixes