The worst nightmare of a cloud user coming true.
But my keys are in the .ssh home folder, protected, why would you put them in configs? What kind of awful deployment tools requires that?
Also, the first thing I do (and AWS recommends) is to setup billing alerts, at least you know that something bad is going on.
also setup a Budget w/ 2fa
Seconding the advice to set up billing alerts, and I would make sure it goes to a variety of email addresses in case one of them is compromised.
Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink.
Hide child comments as well
Confirm
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
The worst nightmare of a cloud user coming true.
But my keys are in the .ssh home folder, protected, why would you put them in configs? What kind of awful deployment tools requires that?
Also, the first thing I do (and AWS recommends) is to setup billing alerts, at least you know that something bad is going on.
also setup a Budget w/ 2fa
Seconding the advice to set up billing alerts, and I would make sure it goes to a variety of email addresses in case one of them is compromised.