Technical requirements
Before we start, we must have the following ready:
- Required: The “target” AWS account used in Chapter 2, which will contain the vulnerable environment and resources
- Optional: A second AWS account (also used in Chapter 2), which will serve as the “attacker’s account”
In case you skipped Chapter 2, Preparing Our First Vulnerable Cloud Lab Environment, feel free to create the AWS accounts using the following link: https://aws.amazon.com/free/. You may proceed with the next steps once the accounts are ready.
Note
This chapter primarily focuses on using Terraform to build a sample vulnerable lab environment on AWS. Of course, we need to have our Microsoft Azure and Google Cloud Platform (GCP) accounts ready once we reach the hands-on portion of the succeeding chapters of this book (Chapter 4 onward). In the meantime, setting up two AWS accounts should do the trick for now.
The source code and other files...