<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: BVS KARTHIK</title>
    <description>The latest articles on DEV Community by BVS KARTHIK (@bvskarthik).</description>
    <link>https://dev.to/bvskarthik</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2064537%2F88d8b130-e772-43fa-a5c2-02328e02fe93.jpg</url>
      <title>DEV Community: BVS KARTHIK</title>
      <link>https://dev.to/bvskarthik</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bvskarthik"/>
    <language>en</language>
    <item>
      <title>Managing and Securing Access to AWS Resources Using IAM</title>
      <dc:creator>BVS KARTHIK</dc:creator>
      <pubDate>Sun, 22 Dec 2024 18:59:45 +0000</pubDate>
      <link>https://dev.to/bvskarthik/managing-and-securing-access-to-aws-resources-using-iam-18pc</link>
      <guid>https://dev.to/bvskarthik/managing-and-securing-access-to-aws-resources-using-iam-18pc</guid>
      <description>&lt;h2&gt;
  
  
  Objective:
&lt;/h2&gt;

&lt;p&gt;In this blog, we’ll explore the basics of AWS Identity and Access Management (IAM), a powerful web service that helps you securely manage access to your AWS resources. The purpose of this post is to guide you through the process of creating IAM users, adding them to IAM groups, and applying permission policies to control access to various services in your AWS account. By the end of this blog, you'll have a solid understanding of how to manage user access efficiently and ensure your AWS environment stays secure.&lt;/p&gt;

&lt;p&gt;Let's dive in and learn together! 🚀&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;Pre-Requisites:&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Before you begin, make sure you have the following:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;AWS Account&lt;/strong&gt;: You need an AWS account to access the AWS Management Console and use IAM services. If you don’t have one, you can create it by visiting the &lt;a href="https://aws.amazon.com/" rel="noopener noreferrer"&gt;AWS website&lt;/a&gt;. &lt;a href="https://aws.amazon.com/resources/create-account/" rel="noopener noreferrer"&gt;How to Create AWS Account&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Basic Understanding of AWS&lt;/strong&gt;: Familiarity with basic AWS services such as EC2, S3, and IAM is helpful, but not required. This guide will walk you through all the necessary steps.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Administrator Access to the AWS Account&lt;/strong&gt;: To manage IAM, you'll need to have &lt;strong&gt;administrator&lt;/strong&gt; access or the necessary IAM permissions to create and manage users, groups, and policies.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Access to the AWS Management Console&lt;/strong&gt;: You’ll need to sign in to the AWS Management Console to perform the steps outlined in this guide.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;With these prerequisites in place, you're ready to start managing and securing access to your AWS resources using IAM.&lt;/p&gt;




&lt;h3&gt;
  
  
  Steps to Complete the Project:
&lt;/h3&gt;

&lt;h4&gt;
  
  
  1. &lt;strong&gt;Sign in to the AWS Management Console&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;First, you need to sign in to your AWS account. Navigate to the &lt;a href="https://aws.amazon.com/console/" rel="noopener noreferrer"&gt;AWS Management Console&lt;/a&gt; and enter your login credentials. Once signed in, you will have access to the broad range of AWS services, including IAM.&lt;/p&gt;

&lt;h4&gt;
  
  
  2. &lt;strong&gt;Set Up IAM Users&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;IAM users are the entities that allow individuals to access AWS resources. Each user in IAM can have a set of permissions that define their level of access.&lt;/p&gt;

&lt;p&gt;To create an IAM user:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go to the &lt;a href="https://us-east-1.console.aws.amazon.com/iam/home?region=us-east-1#/home" rel="noopener noreferrer"&gt;IAM dashboard&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Users&lt;/strong&gt; in the left-hand menu.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fadlo9hohndd2goy2x7sy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fadlo9hohndd2goy2x7sy.png" alt="IAM Dashboard" width="800" height="340"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click on the &lt;strong&gt;Create user&lt;/strong&gt; button.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcltcg8p4segxe3rbz8z0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcltcg8p4segxe3rbz8z0.png" alt="IAM Users" width="800" height="287"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Specify user details as follows:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;User name: Enter your preferred name for the user (Virat)&lt;/li&gt;
&lt;li&gt;Check the Provide user access to the AWS Management Console - 
optional checkbox&lt;/li&gt;
&lt;li&gt;Select I want to create an IAM user checkbox&lt;/li&gt;
&lt;li&gt;Select Custom password under Console Password and Enter desired 
password for the user&lt;/li&gt;
&lt;li&gt;Uncheck the Users must create a new password at the next 
sign-in (recommended) checkbox.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Next: Permissions&lt;/strong&gt; to move to the next step.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdfymbajcsn665gju80rj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdfymbajcsn665gju80rj.png" alt="Specify user details" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In the Set permissions section, keep things as default. Click on the Next button.&lt;/li&gt;
&lt;li&gt;Scroll down and Under Tags, Click on the Add new tag button:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F56fxy4hrbyp7v4qs697e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F56fxy4hrbyp7v4qs697e.png" alt="Tags" width="800" height="178"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click on the Create User button.&lt;/li&gt;
&lt;li&gt;Save the user credentials to use them later in this lab.&lt;/li&gt;
&lt;li&gt;Click on the Return to users list button and then on the Continue button.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxcukobvfcog2bx6jzt7p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxcukobvfcog2bx6jzt7p.png" alt="User created successfully" width="800" height="266"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Repeat the same steps and tags (Dev-Team) for the IAM user by another name (Rohit).&lt;/li&gt;
&lt;li&gt;Repeat the steps to create IAM users by the name Dravid and Sachin with the following tags, [Key: Ops-Team Value: Ops]&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now we have created 4 IAM users&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ficmhtdqtikeh4u1nw7hs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ficmhtdqtikeh4u1nw7hs.png" alt="IAM Users List" width="800" height="196"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  3. &lt;strong&gt;Set Up IAM User Groups and add IAM Users&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;IAM groups allow you to organize users and assign them specific permissions collectively. Rather than managing individual permissions for each user, groups simplify the process by applying common permissions to all users within a group.&lt;/p&gt;

&lt;p&gt;To create an IAM group:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In the &lt;a href="https://us-east-1.console.aws.amazon.com/iam/home?region=us-east-1#/home" rel="noopener noreferrer"&gt;IAM dashboard&lt;/a&gt;, click on &lt;strong&gt;Groups&lt;/strong&gt; in the left-hand menu.&lt;/li&gt;
&lt;li&gt;Click the &lt;strong&gt;Create Group&lt;/strong&gt; button.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmqimgqgiws821t4gl36e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmqimgqgiws821t4gl36e.png" alt="Create Group" width="800" height="236"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;User group name: Enter 'Dev-Team'&lt;/li&gt;
&lt;li&gt;Scroll down and select 'Virat' and 'Rohit' under Add Users to the group.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhx229n6mf4rq4skk2fhz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhx229n6mf4rq4skk2fhz.png" alt="Create user group" width="800" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Scroll down to the Attach permissions Policies section and search for &lt;strong&gt;AmazonEC2ReadOnlyAccess&lt;/strong&gt; and &lt;strong&gt;AmazonS3ReadOnlyAccess&lt;/strong&gt; policies. These policies provide read access for EC2 and S3 to the added users in the group.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgnopiwe4y3rj2n1qgznr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgnopiwe4y3rj2n1qgznr.png" alt="Attach Ec2 Permissions" width="800" height="146"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzg7g0ng2ouuynli8zi42.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzg7g0ng2ouuynli8zi42.png" alt="Attach S3 Permissions" width="800" height="180"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Review all details and click on the Create group button.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Repeat the same steps to create an &lt;strong&gt;Ops-Team&lt;/strong&gt; group.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Click on the Create group&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;User group name: Ops-Team&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Scroll down and select remaining 2 Users to add them to the &lt;br&gt;
group.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Under Attach permissions Policies, select the &lt;br&gt;
&lt;strong&gt;AmazonEC2FullAccess&lt;/strong&gt; and &lt;strong&gt;AmazonS3FullAccess&lt;/strong&gt; policy. &lt;br&gt;
These policies Provides full access to Amazon EC2 and S3 to the &lt;br&gt;
added users in the group.&lt;br&gt;
Now we have created 2 User groups (Dev-Team &amp;amp; Ops-Team)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffotd94c2tm7qx5aosnzg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffotd94c2tm7qx5aosnzg.png" alt="User groups" width="800" height="182"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Validation:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;Let's log in using one of the Dev-Team users (Virat) and try
to delete an S3 bucket and terminate an EC2 instance that already exists in the account. Since the Dev-Team group only has read-only permissions, these actions should not be allowed.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Here’s what to do:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Log in to the AWS Account using the Dev-Team User credentials.&lt;/li&gt;
&lt;li&gt;Open the S3 Service in the AWS Management Console.&lt;/li&gt;
&lt;li&gt;Try to delete the S3 bucket. You should see a "Permission 
Denied" error because the Dev-Team user doesn’t have the 
required permissions to delete the bucket.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdctlbgb7hltlnepm6r67.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdctlbgb7hltlnepm6r67.png" alt="S3 Bucket" width="800" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4a8ee1pf5ojjrzwjkza.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4a8ee1pf5ojjrzwjkza.png" alt="Delete Bucket" width="800" height="245"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frvnqv84bajva353zugbz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frvnqv84bajva353zugbz.png" alt="Permission Denied Error" width="800" height="161"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to EC2 Console and try terminating the Instance&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4tvdfz608hm8q5oewsek.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4tvdfz608hm8q5oewsek.png" alt="Ec2 Instance" width="800" height="134"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyioqh7nz4y3fs6ih2jbo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyioqh7nz4y3fs6ih2jbo.png" alt="Terminate Instance" width="800" height="333"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3ez175473xdkn9lyx480.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3ez175473xdkn9lyx480.png" alt="Error Message" width="800" height="281"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This will confirm that the read-only permissions are working as expected and prevent any modifications to resources in the account.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Now, let’s log in using an Ops-Team user (Sachin) and try the 
same actions. 
This time, the operations should succeed because the Ops-Team 
group has full permissions for EC2 and S3.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Here’s what to do:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Log in to the AWS Account using the Ops-Team User credentials (Sachin).&lt;/li&gt;
&lt;li&gt;Navigate to the S3 Service in the AWS Management Console.&lt;/li&gt;
&lt;li&gt;Try to delete the S3 bucket.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa50j663ujbaoctisop1m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa50j663ujbaoctisop1m.png" alt="S3 Bucket" width="800" height="240"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6p8ph1eyta3hb7am9yk6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6p8ph1eyta3hb7am9yk6.png" alt="Delete S3 Bucket" width="800" height="243"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The bucket deleted successfully as the Ops-Team group has the 
necessary permissions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feb5vzoehjuz4ggcy86vv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feb5vzoehjuz4ggcy86vv.png" alt="Bucket deleted Successfully" width="800" height="210"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to the EC2 Service in the AWS Management Console.&lt;/li&gt;
&lt;li&gt;Select an EC2 instance and terminate it.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqqj7ckbrrkwos7ctclmu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqqj7ckbrrkwos7ctclmu.png" alt="Ec2 Instance" width="800" height="153"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr81ij5o85sxjq3lvbufp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr81ij5o85sxjq3lvbufp.png" alt="Terminate Instance" width="800" height="330"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The instance terminated successfully, confirming that the full 
permissions are applied correctly for this group.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp02di067r2uqg4ry8fql.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp02di067r2uqg4ry8fql.png" alt="Instance Terminated Successfully" width="800" height="101"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This demonstrates how IAM policies can be used to enforce different levels of access for various user groups based on their roles.&lt;/p&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;AWS IAM is a powerful tool for securely managing access to your AWS resources. By following the steps outlined in this blog, you’ve learned how to create IAM users, organize them into groups, and apply permission policies to control access to various AWS services. Proper use of IAM ensures that you have fine-grained control over who can access your AWS resources and what actions they can perform.&lt;/p&gt;

&lt;p&gt;Thank you for reading, and I hope this blog has helped you gain a deeper understanding of how to manage and secure access to your AWS resources using IAM. Feel free to explore more AWS services and stay tuned for more tips on managing your cloud infrastructure securely!&lt;/p&gt;




</description>
      <category>aws</category>
      <category>cloud</category>
      <category>iam</category>
      <category>security</category>
    </item>
  </channel>
</rss>
