<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Afshan Naqvi</title>
    <description>The latest articles on DEV Community by Afshan Naqvi (@afshan).</description>
    <link>https://dev.to/afshan</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1110604%2Fd729e3ad-b104-4aec-bc03-047f3801cd4b.jpg</url>
      <title>DEV Community: Afshan Naqvi</title>
      <link>https://dev.to/afshan</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/afshan"/>
    <language>en</language>
    <item>
      <title>AWS Solution Architect- Associate: Important Topics</title>
      <dc:creator>Afshan Naqvi</dc:creator>
      <pubDate>Sun, 30 Mar 2025 10:57:01 +0000</pubDate>
      <link>https://dev.to/afshan/aws-solution-architect-associate-important-topics-28gn</link>
      <guid>https://dev.to/afshan/aws-solution-architect-associate-important-topics-28gn</guid>
      <description>&lt;p&gt;Hey guys! 🎉&lt;/p&gt;

&lt;p&gt;I’m super excited to share that I recently passed the AWS Solution Architect Associate certification! In this document, I’ve put together a list of key AWS topics that you must learn and understand to ace the exam.&lt;/p&gt;

&lt;p&gt;This isn’t a full blog post—just a quick and handy reference guide to help you focus on the most important topics. Note: This list highlights essential exam concepts, but I highly recommend using it alongside other study materials for a well-rounded understanding.&lt;/p&gt;

&lt;p&gt;I’ve also made a video where I share my exam experience, study tips, and insights to help you prepare better. If you’re interested, check it out here: &lt;a href="https://youtu.be/HyYjveYPC3o" rel="noopener noreferrer"&gt;https://youtu.be/HyYjveYPC3o&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  1️⃣ EC2 (Elastic Compute Cloud)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;EC2 Instance&lt;/strong&gt;: Virtual servers in AWS for running applications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Types of EC2 Instances&lt;/strong&gt;: General Purpose (T, M), Compute Optimized (C), Memory Optimized (R, X), Storage Optimized (I, D, H), GPU-based (P, G, F).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pricing Options&lt;/strong&gt;: On-Demand (pay as you go), Reserved (1-3 years), Spot (cheapest, but interruptible), Savings Plans, Dedicated Hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost-Effective Solutions&lt;/strong&gt;: Choose instance types based on workload, use Spot and Reserved instances, enable auto-scaling.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snapshots (EBS Snapshots):&lt;/strong&gt; A point-in-time backup of an Amazon EBS volume.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AMI (Amazon Machine Image):&lt;/strong&gt;  A pre-configured template for launching EC2 instances.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2️⃣ S3 Storage
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Types of S3 Storage&lt;/strong&gt;: Standard, Intelligent-Tiering, Standard-IA, One Zone-IA, Glacier, Glacier Deep Archive.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;S3 Replication&lt;/strong&gt;: Copies data across buckets for redundancy and availability.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-Region Replication (CRR)&lt;/strong&gt;: Replicates data across different AWS regions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Same-Region Replication (SRR)&lt;/strong&gt;: Replicates data within the same AWS region.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Object Versioning&lt;/strong&gt;: Keeps multiple versions of an object to protect against accidental deletion.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;S3 Lifecycle&lt;/strong&gt;: Automatically moves data between storage classes based on age.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Presigned URLs (S3):&lt;/strong&gt; Provides temporary access to private S3 objects without making them public.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;S3 Glacier&lt;/strong&gt; storage options:

&lt;ul&gt;
&lt;li&gt;S3 Glacier Instant Retrieval&lt;/li&gt;
&lt;li&gt;S3 Glacier Flexible Retrieval&lt;/li&gt;
&lt;li&gt;S3 Glacier Deep Archive&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  3️⃣ AWS Storage Services
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;EBS (Elastic Block Store)&lt;/strong&gt;: Persistent storage for EC2, used for databases and applications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Types of EBS Volumes&lt;/strong&gt;: General Purpose SSD (gp2, gp3), Provisioned IOPS SSD (io1, io2), Throughput Optimized HDD (st1), Cold HDD (sc1).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IOPS and Throughput&lt;/strong&gt;: IOPS (speed of small transactions), throughput (speed of large data transfers).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Instance Store&lt;/strong&gt;: Temporary storage directly attached to EC2 instances.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EFS (Elastic File System)&lt;/strong&gt;: Managed file storage for multiple EC2 instances.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FSx&lt;/strong&gt;: Managed file system for Windows and Lustre workloads.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;When to Use Each Storage Service&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;EBS – Persistent storage for EC2.&lt;/li&gt;
&lt;li&gt;EFS – Shared storage for multiple instances.&lt;/li&gt;
&lt;li&gt;FSx – Windows file system and high-performance workloads.&lt;/li&gt;
&lt;li&gt;Instance Store – Temporary storage for fast processing.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  4️⃣ Networking &amp;amp; VPC
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;VPC (Virtual Private Cloud)&lt;/strong&gt;: Isolated network within AWS for launching resources.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Subnets&lt;/strong&gt;: Divide VPC into public and private sections.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Five Reserved IP Addresses&lt;/strong&gt;: AWS reserves the first 5 IPs in each subnet for internal purposes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Groups&lt;/strong&gt;: Firewall for instances (stateful, allows specific traffic).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;NACLs (Network ACLs)&lt;/strong&gt;: Firewall for subnets (stateless, controls inbound/outbound rules).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Internet Gateway&lt;/strong&gt;: Connects VPC to the internet for public-facing instances.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;NAT Gateway&lt;/strong&gt;: Allows private instances to access the internet without being exposed.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Route Table:&lt;/strong&gt;  Defines how network traffic is directed within a &lt;strong&gt;VPC&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VPC Flow Logs&lt;/strong&gt;: Captures network traffic metadata for monitoring and troubleshooting.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5️⃣ IAM &amp;amp; Security
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;IAM Roles, Groups, and Users&lt;/strong&gt;: Roles (assigned to AWS services), Groups (user collections), Users (individual accounts).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Identity Policy&lt;/strong&gt;: Defines permissions for IAM users, roles, and groups.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Resource Policy&lt;/strong&gt;: Defines permissions at the resource level (e.g., S3 bucket policy).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SCP (Service Control Policies)&lt;/strong&gt;: Controls permissions at the organization level.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Organizations&lt;/strong&gt;: Manages multiple AWS accounts under a single management account.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KMS (Key Management Service)&lt;/strong&gt;: Encrypts data using AWS-managed or customer-managed keys.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Secrets Manager&lt;/strong&gt;: Securely stores and manages secrets like passwords and API keys.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Systems Manager &amp;amp; Parameter Store&lt;/strong&gt;: Stores configuration data securely.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS WAF&lt;/strong&gt;: Protects applications from web attacks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Shield&lt;/strong&gt;: DDoS protection for AWS resources.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Inspector&lt;/strong&gt;: Automated security assessment for vulnerabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon GuardDuty&lt;/strong&gt;: Threat detection using AI and logs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon Macie&lt;/strong&gt;: Uses ML to detect sensitive data exposure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Certificate Manager(ACM):&lt;/strong&gt; Manages SSL/TLS certificates for AWS services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Inline Policy&lt;/strong&gt;: Directly attached to a user, group, or role.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Policy Restrictions&lt;/strong&gt;: Least privilege principle to restrict unnecessary access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Types of Encryption&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;At-rest&lt;/strong&gt; (EBS, S3, RDS encryption).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;In-transit&lt;/strong&gt; (SSL/TLS).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Client-side&lt;/strong&gt; (before sending data to AWS).&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  6️⃣ Containers
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ECS (Elastic Container Service)&lt;/strong&gt;: Managed container orchestration for Docker containers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EKS (Elastic Kubernetes Service)&lt;/strong&gt;: Fully managed Kubernetes service for containerized applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  7️⃣ Monitoring &amp;amp; Logging
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CloudWatch&lt;/strong&gt;: Monitors AWS resources and applications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CloudTrail&lt;/strong&gt;: Tracks API activity and user actions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Config&lt;/strong&gt;: Tracks AWS resource configurations and compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  8️⃣ Global Services
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Route 53&lt;/strong&gt;: AWS-managed DNS service.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CloudFront&lt;/strong&gt;: Content delivery network (CDN) for fast content distribution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Global Accelerator&lt;/strong&gt;: Improves global application availability and performance.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  9️⃣ Databases
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;RDS (Relational Database Service)&lt;/strong&gt;: Managed relational databases (MySQL, PostgreSQL, SQL Server, etc.).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;DynamoDB&lt;/strong&gt;: NoSQL database with key-value and document storage.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Aurora&lt;/strong&gt;: High-performance relational database compatible with MySQL and PostgreSQL.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Read Replica&lt;/strong&gt;: Improves read performance by replicating databases.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ElastiCache&lt;/strong&gt;: In-memory caching for faster database performance.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Redshift&lt;/strong&gt;: Managed data warehouse for analytics.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;DocumentDB&lt;/strong&gt;: Managed NoSQL database compatible with MongoDB.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Neptune&lt;/strong&gt;: Managed graph database for relationships and networks.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔟 Storage Gateway
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Tape Gateway&lt;/strong&gt;: Virtual tape storage for backup solutions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon S3 File Gateway&lt;/strong&gt;: Stores files as objects in S3.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon FSx File Gateway&lt;/strong&gt;: Extends FSx file systems to on-premises environments.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Volume Gateway&lt;/strong&gt;: Hybrid cloud storage for block-based applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  1️⃣1️⃣ Load Balancing &amp;amp; Disaster Recovery
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ELB (Elastic Load Balancer)&lt;/strong&gt;: Distributes traffic across instances.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Types of ELB&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Application Load Balancer (ALB)&lt;/strong&gt; – Layer 7, routes based on URL.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network Load Balancer (NLB)&lt;/strong&gt; – Layer 4, low-latency performance.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Gateway Load Balancer (GWLB):&lt;/strong&gt; Distributes traffic across third-party virtual appliances (e.g., firewalls, IDS/IPS).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Classic Load Balancer (CLB)&lt;/strong&gt; – Older, Layer 4/7 balancing.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Auto Scaling Group (ASG)&lt;/strong&gt;: Automatically scales EC2 instances based on demand.&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;ASG Policies&lt;/strong&gt;: Target tracking, step scaling, scheduled scaling.&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Disaster Recovery Strategies&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Backup &amp;amp; Restore&lt;/li&gt;
&lt;li&gt;Pilot Light&lt;/li&gt;
&lt;li&gt;Warm Standby&lt;/li&gt;
&lt;li&gt;Multi-Site&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;AWS Backup Service&lt;/strong&gt;: Centralized backup management for AWS resources.&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;AWS Snow Family&lt;/strong&gt;: Physical devices for data transfer (Snowcone, Snowball, Snowmobile).&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  1️⃣2️⃣ Placement Groups for Amazon EC2
&lt;/h3&gt;

&lt;p&gt;A &lt;strong&gt;placement group&lt;/strong&gt; is a logical grouping of EC2 instances that influence how instances are placed on underlying hardware to optimize performance, fault tolerance, or availability.&lt;/p&gt;

&lt;p&gt;Types of Placement Strategies:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cluster&lt;/strong&gt; – Low-latency, high-bandwidth networking for HPC workloads.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Partition&lt;/strong&gt; – Isolates instance groups across partitions for fault tolerance in distributed systems.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spread&lt;/strong&gt; – Distributes instances across different hardware to reduce failure impact.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I'm also digitizing my notes since I originally wrote them in a physical notebook. If you're interested in getting a copy, feel free to reach out to me on &lt;a href="https://www.linkedin.com/in/afshan514/" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt;, and I'll share them with you once I’ve compiled everything! 😊&lt;/p&gt;

&lt;p&gt;Happy studying, and best of luck with your AWS journey! 🚀💡&lt;/p&gt;

</description>
      <category>certification</category>
      <category>solutionarchitect</category>
      <category>importantservices</category>
      <category>aws</category>
    </item>
    <item>
      <title>Essential AWS IAM Enumeration Commands</title>
      <dc:creator>Afshan Naqvi</dc:creator>
      <pubDate>Tue, 31 Oct 2023 17:02:51 +0000</pubDate>
      <link>https://dev.to/afshan/essential-aws-cli-iam-enumeration-commands-23cf</link>
      <guid>https://dev.to/afshan/essential-aws-cli-iam-enumeration-commands-23cf</guid>
      <description>&lt;p&gt;Hey everyone,&lt;/p&gt;

&lt;p&gt;I hope you all are doing well. &lt;/p&gt;

&lt;p&gt;Today, I would like to share some AWS CLI commands that I've found incredibly useful in my cloud security projects. As AWS is our primary cloud provider, having a good grasp of AWS CLI is essential. In this post, I'll be focusing on IAM (Identity and Access Management) enumeration through the command line.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note: I've compiled these commands for my own quick reference. As I discover more valuable commands, I'll keep adding them here in the future.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let's get started!&lt;/p&gt;

&lt;p&gt;To begin, it's crucial to learn how to configure AWS keys via the CLI. This skill is essential because many clients entrust you with programmatic keys to assess potential vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Configure AWS Credentials:&lt;/strong&gt;&lt;br&gt;
You can configure the AWS keys using the following command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws configure
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You will be prompted to enter your AWS Access Key ID, AWS Secret Access Key, default region, and default output format.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fu822Xu5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9o7a6jo769zbtnc51rgs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fu822Xu5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9o7a6jo769zbtnc51rgs.png" alt="Image description" width="800" height="230"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. WhoAmI:&lt;/strong&gt;&lt;br&gt;
To check the identity associated with your AWS CLI session, you can use the sts get-caller-identity command, commonly referred to as "whoami":&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws sts get-caller-identity
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--UQdWuvos--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5dhb49xit7d54ihw6sti.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--UQdWuvos--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5dhb49xit7d54ihw6sti.png" alt="Image description" width="800" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. List IAM Users:&lt;/strong&gt;&lt;br&gt;
IAM users are commonly used for representing individuals, employees, or applications that require access to your AWS environment. Use the following command to list IAM users in your AWS account:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-users
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ZytTXX_2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/scfalwdyf5npw7jnyf0p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ZytTXX_2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/scfalwdyf5npw7jnyf0p.png" alt="Image description" width="800" height="537"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. List IAM Groups:&lt;/strong&gt;&lt;br&gt;
IAM Groups are collections of users who share similar access requirements. You can use the following command to list IAM groups in your AWS account:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-groups
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--nMhu5Rw_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yjqu8y2pvloyfqxiw558.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--nMhu5Rw_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yjqu8y2pvloyfqxiw558.png" alt="Image description" width="787" height="572"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. List IAM Roles:&lt;/strong&gt;&lt;br&gt;
In short, IAM roles are associated with specific job functions or responsibilities within an organization. Use the following command to list IAM roles in your AWS account:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-roles
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5wCMqChB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gh9fww371o7yj9iindjj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5wCMqChB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gh9fww371o7yj9iindjj.png" alt="Image description" width="800" height="457"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6.List Attached Policies for a User/Group/Role:&lt;/strong&gt;&lt;br&gt;
A policy is a set of rules or guidelines that define what actions are allowed or denied in a specific context. Most policies are stored in AWS as JSON documents.&lt;/p&gt;

&lt;p&gt;To list the attached policies for an IAM user, group, or role, please replace USER_NAME, GROUP_NAME, or ROLE_NAME with the appropriate name:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-attached-user-policies --user-name USER_NAME
aws iam list-attached-group-policies --group-name GROUP_NAME
aws iam list-attached-role-policies --role-name ROLE_NAME
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;List Attached policy for an IAM user:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TMssd6uD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gk31rgqms5su10myhkg5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TMssd6uD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gk31rgqms5su10myhkg5.png" alt="Image description" width="800" height="284"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;List Attached policy for an IAM group:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--oDCVPkyD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a6kqc151l2enz5ysqgnd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--oDCVPkyD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a6kqc151l2enz5ysqgnd.png" alt="Image description" width="800" height="258"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;List Attached policy for an IAM role:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zLhGmJ9K--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1rss0jzh768a8nzlact8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zLhGmJ9K--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1rss0jzh768a8nzlact8.png" alt="Image description" width="800" height="240"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. List Inline Policies for a User/Group/Role:&lt;/strong&gt;&lt;br&gt;
To list inline policies for an IAM user, group, or role, replace USER_NAME, GROUP_NAME, or ROLE_NAME with the appropriate name:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-user-policies --user-name USER_NAME
aws iam list-group-policies --group-name GROUP_NAME
aws iam list-role-policies --role-name ROLE_NAME
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;8. List Managed Policies:&lt;/strong&gt;&lt;br&gt;
To list managed policies in your AWS Identity and Access Management (IAM) environment. When you run this command, it retrieves and displays a list of IAM policies that are available in your AWS account.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-policies
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Kn3BbQE1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y2ydtq364xiihvyi2dx6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Kn3BbQE1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y2ydtq364xiihvyi2dx6.png" alt="Image description" width="800" height="351"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;9. List Policy Versions:&lt;/strong&gt;&lt;br&gt;
To list all versions of a managed policy, specify the policy ARN (Amazon Resource Name):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-policy-versions --policy-arn POLICY_ARN
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--y63HFy1x--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nbubaq7it5pxnu0p7mob.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--y63HFy1x--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nbubaq7it5pxnu0p7mob.png" alt="Image description" width="800" height="278"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;10. Get Policy Document:&lt;/strong&gt;&lt;br&gt;
To view the policy document for a specific policy version, use the get-policy-version command with the version ID and policy ARN:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam get-policy-version --policy-arn POLICY_ARN --version-id VERSION_ID
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1x6-sd5M--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3ujkgrylwba9okd84vop.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1x6-sd5M--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3ujkgrylwba9okd84vop.png" alt="Image description" width="800" height="299"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;11. Assuming an IAM Role:&lt;/strong&gt;&lt;br&gt;
Assuming a role in AWS is like temporarily wearing a permission hat to access resources securely. You can assume a role using the following command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws sts assume-role --role-arn arn:aws:iam::123456789012:role/MyNewRole --role-session-name MySession
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xDEWvslG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gk521t6eeikwy1p8frus.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xDEWvslG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gk521t6eeikwy1p8frus.png" alt="Image description" width="800" height="108"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After assuming a role, you can obtain temporary credentials, and you can export them into your environment variables as follows:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;export AWS_ACCESS_KEY_ID=your_access_key_id
export AWS_SECRET_ACCESS_KEY=your_secret_access_key
export AWS_SESSION_TOKEN=your_session_token
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Make sure to replace your_access_key_id, your_secret_access_key, and your_session_token with the actual values you received when assuming the role.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;12. List Instance Profiles:&lt;/strong&gt;&lt;br&gt;
IAM instance profile is used to link an IAM role to an EC2 instance, allowing the instance to assume the role and obtain temporary credentials to access AWS services and resources based on the role's permissions. Use the following command to list IAM instance profiles in your AWS account:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-instance-profiles
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--v2m-ey4f--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/t4u7fxn0dq33ac0bf81i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--v2m-ey4f--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/t4u7fxn0dq33ac0bf81i.png" alt="Image description" width="800" height="732"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;13. List SSH Public Keys:&lt;/strong&gt;&lt;br&gt;
To list SSH public keys associated with IAM users:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-ssh-public-keys --user-name USER_NAME
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--sxI6Fbtm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/if2pix5le80aab7jmox0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--sxI6Fbtm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/if2pix5le80aab7jmox0.png" alt="Image description" width="800" height="243"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;14. List MFA Devices:&lt;/strong&gt;&lt;br&gt;
MFA in AWS is a security feature that requires users to provide two or more factors of authentication (typically something they know and something they have) to access their AWS account, enhancing security and reducing the risk of unauthorized access.&lt;/p&gt;

&lt;p&gt;You can list multi-factor authentication (MFA) devices associated with IAM users by using the following command.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-mfa-devices --user-name USER_NAME
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2yr90ISj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zn80gyc1aspxtsrfewst.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2yr90ISj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zn80gyc1aspxtsrfewst.png" alt="Image description" width="800" height="308"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;15. List Service-Specific Credentials:&lt;/strong&gt;&lt;br&gt;
Service-specific credentials in AWS are temporary and limited-scope security credentials designed for use by AWS services and third-party applications. Use the following command to list AWS service-specific credentials for an IAM user.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-service-specific-credentials --user-name USER_NAME
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qr7hy8eC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/d3n134b40lem3ssc52rt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qr7hy8eC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/d3n134b40lem3ssc52rt.png" alt="Image description" width="800" height="231"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;16. Creating an IAM User:&lt;/strong&gt;&lt;br&gt;
You can create an IAM user using the create-user command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam create-user --user-name MyNewUser
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Fs2gRiJN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3fzw4sp6u58qsl3wx6aa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Fs2gRiJN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3fzw4sp6u58qsl3wx6aa.png" alt="Image description" width="800" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;17. Creating an IAM Group:&lt;/strong&gt;&lt;br&gt;
You can create an IAM group using the create-group command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam create-group --group-name MyNewGroup
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Q8TdjJfy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/284xmccf0okut87p392z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Q8TdjJfy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/284xmccf0okut87p392z.png" alt="Image description" width="800" height="362"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;18. Attaching a Policy to a User or Group:&lt;/strong&gt;&lt;br&gt;
You can attach an existing IAM policy to a user or group using the attach-user-policy or attach-group-policy command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam attach-user-policy --policy-arn arn:aws:iam::aws:policy/AmazonS3FullAccess --user-name MyNewUser
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonEC2FullAccess --group-name MyNewGroup
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vx0nZw3t--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/no940dulpfvq8u4k46i2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vx0nZw3t--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/no940dulpfvq8u4k46i2.png" alt="Image description" width="800" height="130"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;19. List Server Certificates:&lt;/strong&gt;&lt;br&gt;
 A server certificate refers to a digital certificate used to secure network communication between clients and your server or service. These certificates are primarily used for enabling secure, encrypted connections using protocols like HTTPS, which is crucial for protecting data in transit.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam list-server-certificates
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When you run this command, it will return a list of server certificates associated with your AWS account, including information such as the certificate name, the Amazon Resource Name (ARN), the expiration date, and the path.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--L4k5GvX4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7r5s0wtnko697nk5zk7b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--L4k5GvX4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7r5s0wtnko697nk5zk7b.png" alt="Image description" width="668" height="297"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;20. Generating AWS Credential Reports&lt;/strong&gt;&lt;br&gt;
AWS Credential Reports provide valuable insights into the security of your AWS account by detailing IAM user access and activity. To generate a credential report using the AWS Command Line Interface (CLI), follow these steps:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Generate the Report:&lt;/strong&gt; Use the generate-credential-report command to initiate the report generation process. This command doesn't provide immediate access to the report but triggers its creation.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam generate-credential-report
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;2. Wait for Completion:&lt;/strong&gt; Credential reports typically take a few hours to generate. Check the status using the get-credential-report command. Repeat this step until the report is marked as "Ready."&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam get-credential-report
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fs20RL46--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pq1bkakqiz1tvdnq1loj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fs20RL46--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pq1bkakqiz1tvdnq1loj.png" alt="Image description" width="800" height="536"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Retrieve the Report:&lt;/strong&gt; Once the report is ready, use the get-credential-report command to retrieve and save the report in a CSV file for analysis.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam get-credential-report --query 'Content' --output text | base64 -d &amp;gt; credential-report.csv
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CPpk3fbJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qxgd0qfvycvoky1hd7r3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CPpk3fbJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qxgd0qfvycvoky1hd7r3.png" alt="Image description" width="800" height="334"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Well, folks, that's a wrap for this post.If you're into cloud penetration testing, feel free to dive into my &lt;a href="https://pwnedlabs.io/"&gt;Pwned Labs&lt;/a&gt; lab-solving playlist. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=ZHs9LKph23w&amp;amp;list=PL_46-JrHsoaadr6nP4U9yHBrS3Lnmtj_Y&amp;amp;ab_channel=Afshan-AFSHackersAcademy"&gt;Cloud Pentesting Playlist&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks for stopping by, and take care!&lt;/p&gt;

</description>
      <category>cloudsecurity</category>
      <category>aws</category>
      <category>cli</category>
      <category>security</category>
    </item>
    <item>
      <title>AI Hackathon: Sentiment Analysis with Python Flask and Transformer</title>
      <dc:creator>Afshan Naqvi</dc:creator>
      <pubDate>Fri, 30 Jun 2023 16:59:07 +0000</pubDate>
      <link>https://dev.to/afshan/ai-hackathon-sentiment-analysis-with-python-flask-and-transformer-2nfi</link>
      <guid>https://dev.to/afshan/ai-hackathon-sentiment-analysis-with-python-flask-and-transformer-2nfi</guid>
      <description>&lt;p&gt;Hey there, fellow AI/ML enthusiasts! &lt;/p&gt;

&lt;p&gt;I hope you're having a blast out there in the world of tech!&lt;/p&gt;

&lt;p&gt;In case you don't know me, I'm Afshan, your programming buddy.I recently became a part of the AWS Community Builder program, and we just had our first AI hackathon. This blog is all about that hackathon.&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting Started in AI:
&lt;/h2&gt;

&lt;p&gt;To be honest, AI is quite new to me,so participating in this hackathon was a great starting point for me to learn through hands-on practice.&lt;/p&gt;

&lt;h2&gt;
  
  
  Hackathon Overview:
&lt;/h2&gt;

&lt;p&gt;The AI hackathon welcomed individuals of all skill levels, from beginners to experts. It was a diverse and inclusive event that fostered collaboration and learning. I thoroughly enjoyed being part of this inclusive environment where knowledge-sharing and growth were encouraged.&lt;/p&gt;

&lt;h2&gt;
  
  
  Project Focus: Sentiment Analysis with Transformer Framework
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ubuUnyeQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9yth7h2ztsqceamdasx3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ubuUnyeQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9yth7h2ztsqceamdasx3.png" alt="Sentiment_UI" width="800" height="292"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For the hackathon, my project focused on sentiment analysis, and it was a requirement to use the transformer framework. Leveraging this powerful framework, I built a sentiment analysis program that can analyze text and determine the sentiment conveyed—whether it's positive, negative, or neutral.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JB-HcrAI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lzyj8dc6mws7fogwsdxp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JB-HcrAI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lzyj8dc6mws7fogwsdxp.png" alt="Positive Result" width="800" height="404"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Motivation: AWS Comprehend Service:
&lt;/h2&gt;

&lt;p&gt;One of the significant motivations behind my project was the AWS Comprehend service. With AWS Comprehend, you can gain valuable insights by understanding customer sentiment, extracting key information, and analyzing documents on a large scale. It empowers you to decode the true meaning behind vast amounts of text, helping you uncover hidden patterns, trends, and actionable intelligence.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--x2AuhsKM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1mwz2f7mzjjp7q2i2oyo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--x2AuhsKM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1mwz2f7mzjjp7q2i2oyo.png" alt="Negative Emotion" width="800" height="408"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Challenges Faced: UI Designing:
&lt;/h2&gt;

&lt;p&gt;While working on the project, I encountered several challenges in UI designing, as it's not my field of expertise. However, I gave it my best shot to ensure proper margin and padding. &lt;/p&gt;

&lt;h2&gt;
  
  
  Implications: Sharing the Tool with College Students:
&lt;/h2&gt;

&lt;p&gt;This project is open to college students, who can make use of it in their graduation presentations. It provides an excellent opportunity for college students to incorporate this project into their academic work and showcase its functionality. Additionally, students have the freedom to enhance and customize the program according to their specific needs and requirements.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qZ5tX5io--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xazei7pmjdlvnjs02yvy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qZ5tX5io--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xazei7pmjdlvnjs02yvy.png" alt="students" width="687" height="577"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Learning:
&lt;/h2&gt;

&lt;p&gt;I have learnt a lot about Generative AI and the transformer framework. Additionally, I had the opportunity to connect with brilliant minds in our industry during the hackathon. Interestingly, this event also made me realize the significance of improving my front-end skills... but let's just say I was only joking!😄&lt;/p&gt;

&lt;p&gt;Github Project link: &lt;a href="https://github.com/Afs514/AI_hackathon/"&gt;https://github.com/Afs514/AI_hackathon/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>python</category>
      <category>beginners</category>
      <category>hackathon</category>
    </item>
  </channel>
</rss>
