Summary
In this chapter, we learned how to create IAM users and groups and the significance of using them. We explored different IAM policies, how to create them, and how to always use the fundamental of least privilege so that we only assign the minimum access rights to the user so that they can do their job. We also looked at the importance of IAM roles, how AWS STS works, and how temporary credentials reduce the chance of IAM keys being leaked to the internet.
Finally, we wrapped things up with two real-world examples. First, we restricted the user to a specific instance using CloudFormation. By doing this, we can save costs so that users can only launch specific instance types. Then, we looked at how to deactivate the user's access/secret key once a specific day's threshold has been met. We used Boto3 to reduce the security blast radius.
In the next chapter, we will focus on networking components, VPC, and how to create it. We will also learn what a transit gateway...