Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
AWS FinOps Simplified

You're reading from   AWS FinOps Simplified Eliminate cloud waste through practical FinOps

Arrow left icon
Product type Paperback
Published in Oct 2022
Publisher Packt
ISBN-13 9781803247236
Length 292 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Peter Chung Peter Chung
Author Profile Icon Peter Chung
Peter Chung
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Chapter 1: FinOps Foundation 2. Part 1: Managing Your AWS Inventory FREE CHAPTER
3. Chapter 2: Establishing the Right Account Structure 4. Chapter 3: Managing Inventory 5. Chapter 4: Planning and Metrics Tracking 6. Chapter 5: Governing Cost and Usage 7. Part 2: Optimizing Your AWS Resources
8. Chapter 6: Optimizing Compute 9. Chapter 7: Optimizing Storage 10. Chapter 8: Optimizing Networking 11. Chapter 9: Optimizing Cloud-Native Environments 12. Part 3: Operationalizing FinOps
13. Chapter 10: Data-Driven FinOps 14. Chapter 11: Driving FinOps Autonomously 15. Chapter 12: Management Functions 16. Index 17. Other Books You May Enjoy

A quick primer on IAM

Until now, we’ve been acting as though creating anomaly detection monitors, running queries on the CUR, and even creating an entire organization is as simple as logging into the management account and doing as you please. Fortunately (or unfortunately?), it’s not as simple as we’d like it to be. In fact, even logging into the management account shouldn’t be as easy as logging into your preferred social media platform.

First, you have to prove who you are. We’re all familiar with the process of authentication by providing a username and password. There’s no shortage of web applications that follow this commonly accepted practice – it’s not much different on AWS. You can associate usernames and passwords to AWS accounts, allowing principals to authenticate their identity using what they know (i.e., a password). You can (and should) enforce an additional layer of authentication using what they have, namely...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime