December 2017
Intermediate to advanced
410 pages
11h 5m
English
We have to make sure that access and secret keys are protected; if they are compromised, then the attacker will be able to decrypt the data. This is the reason why the use of IAM roles is suggested, where you no longer have to manually configure the access and secret keys. All servers must be configured with IAM roles and there should not be any access or secret key configured. Here, we also have to make sure that by default, if the user has access to the server (even as a non-privileged user), he will be able to run the aws cli commands as since IAM role is associated with the instance, the user can decrypt the data without the need of any keys.
Read now
Unlock full access