<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ayesha Arshad</title>
    <description>The latest articles on DEV Community by Ayesha Arshad (@aysharshad).</description>
    <link>https://dev.to/aysharshad</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F845093%2F59bad533-29e9-48c2-af32-11c326a455a0.jpg</url>
      <title>DEV Community: Ayesha Arshad</title>
      <link>https://dev.to/aysharshad</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aysharshad"/>
    <language>en</language>
    <item>
      <title>All you need to know about writing Least Privilege IAM Policies</title>
      <dc:creator>Ayesha Arshad</dc:creator>
      <pubDate>Fri, 22 Apr 2022 17:00:20 +0000</pubDate>
      <link>https://dev.to/aysharshad/all-you-need-to-know-about-writing-least-privilege-iam-policies-3okj</link>
      <guid>https://dev.to/aysharshad/all-you-need-to-know-about-writing-least-privilege-iam-policies-3okj</guid>
      <description>&lt;p&gt;The system of AWS IAM Policies provides a granular structure of permission sets. The reason behind this system is Least Privilege Model.  The least privileged principle allows IAM identities to have the least required access level to complete their tasks. And this is an important unit of Well Architectured best practices.&lt;/p&gt;

&lt;p&gt;In AWS all operations are Implicitly denied until Explicitly Allowed using these policies. However, if an operation is Explicit Denied then this rule has the highest precedence. &lt;/p&gt;

&lt;p&gt;Read about the &lt;a href="https://aysharshad.com/how-to-automate-aws-ec2-windows-patching-using-ssm-automation-document/"&gt;Main principles of AWS Cloud Security&lt;/a&gt; and what role &lt;a href="https://aysharshad.com/all-you-need-to-know-about-aws-identity-access-management-iam/"&gt;IAM plays in securing the AWS Resources&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Structure of IAM Policies
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
    "Version" : "2012-10-17",
    "Statement" : 
    [
        {
            "Sid" : "Human Readable Description",
            "Effect" : "Allow/Deny",
            "Action" : 
                [
                    "Service:api/call"
                ],
            "Resource" :
                ["arn"],
            "Condition" : 
            {
                "Stringequals" : 
                    {
                        "part of string" : "value to match"
                    }
            }
        }
    ]
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://aysharshad.com/all-you-need-to-know-about-writing-least-privilege-iam-policies/"&gt;Read Explanation here&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Ways to create IAM Policies
&lt;/h2&gt;

&lt;p&gt;You can use three main ways to create your desired &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_create.html"&gt;IAM Policies&lt;/a&gt;:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;JSON Editor:&lt;/strong&gt; You can write the policy manually using the aforementioned structure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Visual Editor:&lt;/strong&gt; You can use the visual editor, which is found in IAM Console, to spin the policy.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Import:&lt;/strong&gt; You can import an existing policy from your account to customize it as per your requirements. You can import both AWS and Customer managed Policies&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS CLI:&lt;/strong&gt; Use AWS CLI commands to generate IAM Policies.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://aysharshad.com/all-you-need-to-know-about-writing-least-privilege-iam-policies/"&gt;Read More&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>security</category>
      <category>json</category>
    </item>
    <item>
      <title>All you need to know about AWS Identity and Access Management (IAM)</title>
      <dc:creator>Ayesha Arshad</dc:creator>
      <pubDate>Fri, 22 Apr 2022 16:43:53 +0000</pubDate>
      <link>https://dev.to/aysharshad/all-you-need-to-know-about-aws-identity-and-access-management-iam-1mnk</link>
      <guid>https://dev.to/aysharshad/all-you-need-to-know-about-aws-identity-and-access-management-iam-1mnk</guid>
      <description>&lt;p&gt;Identity and Access Management is one of the major components of the &lt;a href="https://aysharshad.com/how-to-automate-aws-ec2-windows-patching-using-ssm-automation-document/"&gt;Triads of AWS Cloud Security&lt;/a&gt;. AWS is a vast collection of over 200 Web Services. And these Web Services are interacted with using API calls. Identity and Access Management provides the means to Authenticate, Secure and Authorize these API calls.&lt;/p&gt;

&lt;p&gt;These API calls are either made by Users or other Digital Entities (other Applications or AWS Resources themselves). And Identity and Access Management help authenticate and authorize them all.&lt;/p&gt;

&lt;h2&gt;
  
  
  Morphology
&lt;/h2&gt;

&lt;p&gt;Identity and Access Management (IAM) consists of two sections:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;I(Identity)-Authentication:&lt;/strong&gt; Authenticates the requester either a Human entity (User) or Digital Entity (other Applications or AWS Resources).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AM(Access Management)-Authorization:&lt;/strong&gt; Helps you secure access to AWS Cloud Resources.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  IAM Identities
&lt;/h2&gt;

&lt;p&gt;IAM identities are a way to authenticate the API caller. These identities include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Users&lt;/li&gt;
&lt;li&gt;Groups&lt;/li&gt;
&lt;li&gt;Roles&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;API calls are made via three main mediums:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;AWS Console&lt;/li&gt;
&lt;li&gt;AWS Command Line Interface (CLI)&lt;/li&gt;
&lt;li&gt;AWS Language-based Tools and SDKs (like BOTO3, Terraform or Node-Red)&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Types of IAM Policies
&lt;/h2&gt;

&lt;p&gt;IAM Policies can be categorized into two types based on Actors:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Identity-based Policies:&lt;/strong&gt; Describes what an identity (users, groups and roles) has access to. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Permission Boundary:&lt;/strong&gt; Describes the maximum amount of access an Identity-based Policy can provide to an identity. Access of an entity to a resource is decided if allowed by both Identity-based Policy and Permission boundary.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Resource-based Policies:&lt;/strong&gt; Describes who has access to a specific resource. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A further classification of Identity-based Policies include two types:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;AWS Managed Policies:&lt;/strong&gt; These policies are pre-designed by AWS and just need to be attached to users.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customer Managed Policies:&lt;/strong&gt; Customer Managed Policies are a customer-specific combination of permission sets and they can be attached to any entity(users, groups and roles).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Inline Policies:&lt;/strong&gt; Inline Policies are also a kind of customer-managed policy but they are limited to the scope of a specific user or role. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://aysharshad.com/all-you-need-to-know-about-aws-identity-access-management-iam/"&gt;Read More&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>security</category>
    </item>
    <item>
      <title>Main Principles of Security in AWS Cloud</title>
      <dc:creator>Ayesha Arshad</dc:creator>
      <pubDate>Fri, 22 Apr 2022 16:34:25 +0000</pubDate>
      <link>https://dev.to/aysharshad/main-principles-of-security-in-aws-cloud-4mg7</link>
      <guid>https://dev.to/aysharshad/main-principles-of-security-in-aws-cloud-4mg7</guid>
      <description>&lt;p&gt;While discussing the Security of Amazon Web Services which is a collection of over 200 fully managed services. The first thing that needs to be established in this case is that it is a formidable task to secure all of the resources offered by AWS at the moment. Services that are totally different in nature from each other yet overlapping in terms of communication.&lt;/p&gt;

&lt;p&gt;Yet it is crucial for AWS Cloud users to understand the fundamental structure of Cloud Security provided by AWS. Only then they can hope to secure their resources.&lt;/p&gt;

&lt;h2&gt;
  
  
  Rule of Thumb of Security in AWS
&lt;/h2&gt;

&lt;p&gt;Security is not one person's responsibility it is a collective obligation for all. Hence AWS has introduced its &lt;a href="https://aws.amazon.com/compliance/shared-responsibility-model/"&gt;Shared Responsibility Model&lt;/a&gt; for Security and Compliance. The model states that responsibility to secure AWS Resources must be shared between the following: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Customer Responsibility&lt;/li&gt;
&lt;li&gt;AWS Responsibility&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The Triad of AWS Cloud Security
&lt;/h2&gt;

&lt;p&gt;There is no way AWS is going to stop growing its services. And in fact, AWS is also providing a great collection of Security tools as well. Which makes it feel like a great task to secure AWS resources. &lt;/p&gt;

&lt;p&gt;Though the three hell hounds of Security for Amazon Web Services are strong enough to guard your AWS resources. These include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identity Access Management (IAM)&lt;/li&gt;
&lt;li&gt;Virtual Private Cloud (VPC)&lt;/li&gt;
&lt;li&gt;Key Management Service (KMS)&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  IAM
&lt;/h2&gt;

&lt;p&gt;As the first step is to guard the castle itself. Identity and Management System (IAM) plays a vital role as a permission management tool in controlling access to the AWS Infrastructure. &lt;/p&gt;

&lt;p&gt;You can devise a perfect authentication system for both Users and AWS Resources (acting as API calling entities). Every single resource in AWS is accessible via API. IAM provides you with the ability to secure and authorize these API calls. IAM provides the following features that provide a complete security infrastructure required to secure every API call that can be made to or from AWS Resources:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;    Users&lt;/li&gt;
&lt;li&gt;    Groups&lt;/li&gt;
&lt;li&gt;    Roles&lt;/li&gt;
&lt;li&gt;    Policies&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For a further deep dive into Identity Access Management: &lt;a href="https://aysharshad.com/all-you-need-to-know-about-aws-identity-access-management-iam/"&gt;Read this Article&lt;/a&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  VPC
&lt;/h2&gt;

&lt;p&gt;Network is the most important part to secure your AWS Resources. The data transit needs to be made secure in order to make sure that your resources and your data is secure. Virtual Private Cloud is the Virtual Network that holds your AWS resources.&lt;/p&gt;

&lt;p&gt;The network part of VPCs is a separate discussion hence in this article you will only find the security part of the VPC Networking.&lt;/p&gt;

&lt;p&gt;For a further deep dive into VPC: &lt;a href="https://aysharshad.com/understanding-aws-virtual-private-cloud-and-its-importance/"&gt;Read this Article&lt;/a&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  KMS
&lt;/h2&gt;

&lt;p&gt;AWS Key Management Service (KMS) helps you encrypt your data at rest. And it provides integration with all of the AWS resources that are going to hold your data.&lt;/p&gt;

&lt;p&gt;KMS is capable if encrypting any data unless the service has its own encryption system like S3 which houses its own separate system of encryption specific to its own structure and functionality.&lt;/p&gt;

&lt;p&gt;KMS has two main functions:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;To Encrypt and Decrypt your data&lt;/li&gt;
&lt;li&gt;    To guard your Encryption Key&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://aysharshad.com/main-principles-of-security-in-aws-cloud/"&gt;Read More&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>security</category>
      <category>beginners</category>
    </item>
    <item>
      <title>AWS for Beginners: A Quick Zero to Hero Guide</title>
      <dc:creator>Ayesha Arshad</dc:creator>
      <pubDate>Sun, 10 Apr 2022 11:27:00 +0000</pubDate>
      <link>https://dev.to/aysharshad/aws-for-beginners-a-quick-zero-to-hero-guide-3n7f</link>
      <guid>https://dev.to/aysharshad/aws-for-beginners-a-quick-zero-to-hero-guide-3n7f</guid>
      <description>&lt;p&gt;If your starting your journey with AWS then a clear sense of direction and destination is necessary in order for you to succeed in this venture. Amazon Web Services include a far-reaching set of services that translate into million possibilities. And this characteristic makes AWS a fun skill to learn.&lt;/p&gt;

&lt;p&gt;This guide includes methodologies and strategies I have discovered during my journey from being a beginner to a person who has a better understanding of AWS. The key principle is to design a strategy specific to your learning style. And I’ll leave enough material for you to design your strategy.&lt;/p&gt;

&lt;p&gt;I will be including a &lt;a href="https://aysharshad.com/aws-for-beginners-a-quick-zero-to-hero-guide/"&gt;Resource Glossary&lt;/a&gt; for you to refer on my &lt;a href="https://aysharshad.com/aws-for-beginners-a-quick-zero-to-hero-guide/"&gt;website&lt;/a&gt; (which I will be updating from time to time). Some video tutorials are also included in the complete version of this article on my website. Enjoy Learning AWS!&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting Started
&lt;/h2&gt;

&lt;p&gt;There is only one way to get started with AWS and that is:&lt;/p&gt;

&lt;p&gt;Getting your hands dirty! Just create &lt;a href="https://aws.amazon.com/free/"&gt;a free tier account&lt;/a&gt; and get started.&lt;/p&gt;

&lt;h2&gt;
  
  
  Choosing your Field of Expertise​
&lt;/h2&gt;

&lt;p&gt;Choosing your field of expertise is important in order to define your direction. If you will start arbitrarily without choosing a specific field you will be lost in the sea of services AWS provides. Choose the area you are interested in after briefly researching various options available. And then you should systematically build your concepts. Some of the options include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;SysOps Engineer&lt;/li&gt;
&lt;li&gt;DevOps Engineer&lt;/li&gt;
&lt;li&gt;Developer&lt;/li&gt;
&lt;li&gt;Security Engineer&lt;/li&gt;
&lt;li&gt;Solutions Architect&lt;/li&gt;
&lt;li&gt;Data Engineer&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What should be the Grey Structure of your Learning Strategy?​
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Start with familiarizing yourself with the basic services like &lt;a href="https://aysharshad.com/all-you-need-to-know-about-aws-identity-access-management-iam/"&gt;IAM (Identity Access Management)&lt;/a&gt;, EC2 (Elastic Compute Cloud), S3 (Simple Storage Service) and &lt;a href="https://aysharshad.com/starting-to-understand-aws-virtual-private-cloud-and-its-importance/"&gt;VPC (Virtual Private Cloud)&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For each service, you learn to start using the service to get hands-on experience.&lt;/li&gt;
&lt;li&gt;Use that service in a small-scale project so that you can understand the usage and also challenges associated with the service. You can also publish this project to build your portfolio.&lt;/li&gt;
&lt;li&gt;By the end learn best practices and security precautions to complete your learning cycle.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  How to research a Field of Expertise?
&lt;/h2&gt;

&lt;p&gt;In order to research an area of expertise such as Data Engineer or Solutions Architect, you can study the syllabus of that specific certification. Because the certification guide provided by AWS, clearly defines the knowledge associated with that role.&lt;/p&gt;

&lt;p&gt;For instance, if you want to be Solutions Architect read the syllabus for Solutions Architect Associate and Professional Certification.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://aysharshad.com/aws-for-beginners-a-quick-zero-to-hero-guide/"&gt;Resource Glossary for Beginners&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>beginners</category>
      <category>cloud</category>
      <category>challenge</category>
    </item>
  </channel>
</rss>
