Technical requirements
Before we start, we must have the following ready:
- An AWS account, which will serve as the target account that contains the vulnerable environment and resources
- A second AWS account, which will serve as the attacker’s account
Feel free to create these AWS accounts by going to https://aws.amazon.com/free/. You may proceed with the next steps once these accounts are ready.
Note
This chapter primarily focuses on building a sample vulnerable lab environment on AWS. Of course, we need to have our Microsoft Azure and Google Cloud Platform (GCP) accounts ready once we reach the hands-on portion of the succeeding chapters of this book. In the meantime, setting up two AWS accounts should do the trick for now.