O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Temporary credentials

Let's create a scenario where we have an application running on an EC2 instance and want to access a few objects stored in an S3 bucket in a secure way. For this, we define the IAM role and associate it with an EC2 instance. Whenever an application running on an EC2 instance needs to access the S3 object, it calls for metadata and gets the temporary credential to access the S3 bucket. This enables you to not pass the credential or access keys to an application to access the S3 bucket and is also more secure, as passing permanent access or long duration access can be a security risk.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required