Lawmakers Demand Answers as CISA Tries to Contain Data Leak
Lawmakers Demand Answers as CISA Tries to Contain Data Leak — Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity & Infrast
What’s new: A contractor for the U.S. Cybersecurity & Infrastructure Security Agency (CISA) published AWS GovCloud keys and other sensitive agency information on a public GitHub account. The incident has prompted inquiries from lawmakers regarding CISA’s internal security practices. CISA is currently working to invalidate the exposed credentials, which include access to critical internal systems.
Who’s affected
Organizations relying on CISA’s infrastructure and security services may be at risk due to the exposure of sensitive credentials. The breach raises concerns about the security culture within CISA, especially following significant workforce reductions and leadership changes.
What to do
- Monitor for any unauthorized access or anomalies in systems that may have been affected by the leaked credentials.
- Review internal policies regarding the use of public code repositories and implement stricter controls to prevent similar incidents.
- Ensure that all exposed credentials are invalidated and replaced promptly to mitigate potential risks.



