July 2017
Intermediate to advanced
402 pages
9h 38m
English
In Chapter 2, Deploying Your First Web Application, we created our first IAM user. We generated its access key and gave the user full access to the AWS account by assigning the Administrator access policy to that user.
This worked great as we managed to get through most of the book using that user but from a security standpoint, there are a number of concerns that this action caused:
Read now
Unlock full access