July 2017
Intermediate to advanced
402 pages
9h 38m
English
As you have probably realized by now, we are already using IAM extensively. Every system and CloudFormation template we created in the book included one or more IAM resources. Until now, we tried to minimize the complexity of that section to focus on the other resources, our templates, but tightening these rules is one of the most effective ways there is to improve the security of our architecture.
We will take the example of our Hello World application running on top of EC2 to demonstrate how we can tighten the permissions for our role.
When we worked on our CI/CD pipeline, we started to use CodePipeline and CodeDeploy to deploy our application. Whenever someone merges a change in our application, CodePipeline ...
Read now
Unlock full access