<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Isah Bashir Ibrahim </title>
    <description>The latest articles on DEV Community by Isah Bashir Ibrahim  (@get2bash).</description>
    <link>https://dev.to/get2bash</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F905187%2F94ab05f4-acd7-4694-a87e-bd79532ce874.png</url>
      <title>DEV Community: Isah Bashir Ibrahim </title>
      <link>https://dev.to/get2bash</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/get2bash"/>
    <language>en</language>
    <item>
      <title>Security Group Creation in AWS</title>
      <dc:creator>Isah Bashir Ibrahim </dc:creator>
      <pubDate>Fri, 31 Jan 2025 20:34:37 +0000</pubDate>
      <link>https://dev.to/aws-builders/security-group-creation-in-aws-50dc</link>
      <guid>https://dev.to/aws-builders/security-group-creation-in-aws-50dc</guid>
      <description>&lt;p&gt;This document outlines the steps for creating a security group in the Amazon Virtual Private Cloud (VPC) dashboard. You can find an article discussing the full significance of Security Groups &lt;a href="https://dev.to/aws-builders/aws-security-groups-provides-network-level-firewalls-for-instances-354j"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Access the AWS Management Console&lt;br&gt;
Log in to the AWS Management Console using your valid AWS credentials.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Navigate to the VPC Service&lt;br&gt;
In the AWS Management Console, locate and select the VPC service.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access Security Groups&lt;br&gt;
In the VPC navigation panel, select Security Groups.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0rmp30bitrcifiaajmfh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0rmp30bitrcifiaajmfh.png" alt="VPC navigation panel" width="800" height="495"&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a Security Group&lt;br&gt;
Click the Create Security Group button.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwllbiroxyd873cqgzot1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwllbiroxyd873cqgzot1.png" alt="Create Security Group button" width="800" height="138"&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Provide a name for your security group&lt;br&gt;
Name: Provide a descriptive name for your security group (e.g., "Web Server SG").&lt;br&gt;
Description: Enter a brief description of the security group's purpose.&lt;br&gt;
VPC: Select the VPC to which this security group will be associated.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fflhp10mvkme7xz8rigmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fflhp10mvkme7xz8rigmn.png" alt="security group description" width="800" height="235"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Configure Inbound Rules&lt;br&gt;
Click Add Rule to define inbound traffic rules.&lt;br&gt;
Type: Select the type of traffic (e.g., All traffic, TCP, UDP, ICMP, IP Permissions).&lt;br&gt;
Protocol: Specify the protocol (e.g., TCP, UDP, ICMP).&lt;br&gt;
Port Range: Define the port range for the traffic (e.g., 80 for HTTP, 443 for HTTPS).&lt;br&gt;
Source: Determine the source of the traffic:&lt;br&gt;
0.0.0.0/0: Allow traffic from anywhere.&lt;br&gt;
Specific IP addresses/CIDR blocks: Allow traffic from specific IP addresses or IP ranges.&lt;br&gt;
Security Groups: Allow traffic from other security groups within the same VPC.&lt;br&gt;
**Click Add Rule to add more inbound rules as needed.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzzmfr6g96hwfmyvq1lv9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzzmfr6g96hwfmyvq1lv9.png" alt="Inbound rule creation" width="800" height="196"&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Configure Outbound Rules (Optional)&lt;br&gt;
Click Add Rule to define outbound traffic rules.&lt;br&gt;
Type: Select the type of traffic (e.g., All traffic, TCP, UDP, ICMP, IP Permissions).&lt;br&gt;
Protocol: Specify the protocol (e.g., TCP, UDP, ICMP).&lt;br&gt;
Port Range: Define the port range for the traffic (e.g., all ports).&lt;br&gt;
Destination: Determine the destination of the traffic:&lt;br&gt;
0.0.0.0/0: Allow traffic to anywhere.&lt;br&gt;
Specific IP addresses/CIDR blocks: Allow traffic to specific IP addresses or IP ranges.&lt;br&gt;
Security Groups: Allow traffic to other security groups within the same VPC.&lt;br&gt;
**Click Add Rule to add more outbound rules as needed.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvf7wnzh46sbspv49e7ez.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvf7wnzh46sbspv49e7ez.png" alt="Outbound rule creation" width="800" height="144"&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>aws</category>
      <category>security</category>
    </item>
    <item>
      <title>AWS Security Groups provides network-level firewalls for instances.</title>
      <dc:creator>Isah Bashir Ibrahim </dc:creator>
      <pubDate>Sun, 19 Jan 2025 12:44:24 +0000</pubDate>
      <link>https://dev.to/aws-builders/aws-security-groups-provides-network-level-firewalls-for-instances-354j</link>
      <guid>https://dev.to/aws-builders/aws-security-groups-provides-network-level-firewalls-for-instances-354j</guid>
      <description>&lt;h2&gt;
  
  
  1. Introduction
&lt;/h2&gt;

&lt;p&gt;AWS Security Groups function as virtual firewalls within a Virtual Private Cloud (VPC) at the instance level. They serve as an important layer of defence, managing network traffic flow to and from your EC2 instances.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Key Characteristics
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Security groups are stateless. Inbound rules simply restrict incoming traffic and do not automatically permit corresponding outbound traffic. For example, if you allow inbound SSH traffic (port 22), you must specifically allow outward traffic on port 22 to support interactive sessions.&lt;/li&gt;
&lt;li&gt;Instance-level: Security Groups are linked to specific EC2 instances. An instance can have numerous security groups connected, allowing for more flexible and layered security configurations.&lt;/li&gt;
&lt;li&gt;Rule-Based: Security Groups operate according to rules that specify:&lt;/li&gt;
&lt;li&gt;Protocol: (such as TCP, UDP, or ICMP)&lt;/li&gt;
&lt;li&gt;Port Range (e.g., 22 for SSH, 80 for HTTP).&lt;/li&gt;
&lt;li&gt;Source/Destination: (for example, IP addresses, IP ranges, security groups, or 0.0.0.0/0 for all sources and destinations).&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  3. Common Use Cases
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Restricting SSH Access: To prevent unauthorised access, allow SSH communication from only particular IP addresses or security groups.&lt;/li&gt;
&lt;li&gt;Enabling Web Server Access: Allow HTTP and HTTPS traffic from the internet via ports 80 and 443.&lt;/li&gt;
&lt;li&gt;Internal Communication: Enable communication between instances inside a certain VPC or subnet.&lt;/li&gt;
&lt;li&gt;Database Access: Limit database access by only permitting traffic from authorised applications or services.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  4. Best Practices
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Apply the principle of least privilege by granting only the essential permissions. Avoid too liberal rules, which may expose your instances to needless danger.&lt;/li&gt;
&lt;li&gt;Apply Security Group Ingress Rules only occasionally. Carefully assess each inbound rule and only allow necessary traffic.&lt;/li&gt;
&lt;li&gt;Use Security Group Egress Rules: Create outbound rules to manage traffic leaving your instances, particularly for services that connect externally.&lt;/li&gt;
&lt;li&gt;Review and Update: Review your security group rules regularly and update them as appropriate to reflect changes in your application's requirements and security posture.&lt;/li&gt;
&lt;li&gt;Avoid Default Security Groups: The default security group frequently grants extensive permissions. Create specific security groups for each instance and avoid using the default wherever possible.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  5. Common Misconfigurations
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Overly Permissive Rules: Allowing unnecessary traffic from 0.0.0.0/0 (all sources) might greatly broaden the attack vector.&lt;/li&gt;
&lt;li&gt;incorrect Port Numbers: Typos or erroneous port numbers might result in unauthorised access or denial of service.&lt;/li&gt;
&lt;li&gt;Missing Outbound Rules: Failing to create outbound rules for apps that require outgoing connections can cause problems.&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>aws</category>
      <category>ec2</category>
    </item>
    <item>
      <title>Installing and setting up AWS CLI on macOS</title>
      <dc:creator>Isah Bashir Ibrahim </dc:creator>
      <pubDate>Sat, 28 Dec 2024 11:39:37 +0000</pubDate>
      <link>https://dev.to/get2bash/installing-and-setting-up-aws-cli-on-macos-1kcl</link>
      <guid>https://dev.to/get2bash/installing-and-setting-up-aws-cli-on-macos-1kcl</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;The AWS Command Line Interface (AWS CLI) is a uniform platform for managing your AWS resources. With just one tool to download and configure, you can control and automate various AWS services from the command line using scripts.&lt;/p&gt;

&lt;h2&gt;
  
  
  Prerequisite
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;AWS account&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;IAM user with programmatic access&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Installing AWS CLI
&lt;/h2&gt;

&lt;p&gt;Run this command to install AWS CLI on your local machine.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;curl "https://awscli.amazonaws.com/AWSCLIV2.pkg" -o "AWSCLIV2.pkg”
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo installer -pkg AWSCLIV2.pkg -target /
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Verification
&lt;/h2&gt;

&lt;p&gt;To verify that the shell can find and run the AWS command in your $PATH, use the following commands.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;which aws
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You will get the output: /usr/local/bin/aws&lt;/p&gt;

&lt;h2&gt;
  
  
  Setup locally
&lt;/h2&gt;

&lt;p&gt;Run this command to quickly set and view your credentials, Region, and output format. The following example shows sample values.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws configure
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note: Make sure to download your account credentials and input them after running this command.&lt;/p&gt;

&lt;p&gt;This output will look like this if you successfully configure the CLI.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;AWS Access Key ID [None]: ***AIO***DN**7EX****&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;AWS Secret Access Key [None]: w***rXU***MI/****G/**MP***Y&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Default region name [None]: us-****-2&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Default output format [None]: json&lt;/code&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Infrastructure provisioning with AWS CloudFormation</title>
      <dc:creator>Isah Bashir Ibrahim </dc:creator>
      <pubDate>Sat, 17 Feb 2024 22:54:27 +0000</pubDate>
      <link>https://dev.to/aws-builders/infrastructure-provisioning-with-aws-cloudformation-2leh</link>
      <guid>https://dev.to/aws-builders/infrastructure-provisioning-with-aws-cloudformation-2leh</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Provisioning of infrastructure can be a tedious task when carried out on the AWS console, it has a lot of limitations when it comes to tasks like creating same infrastructure when a mistake was made, recreating the same infrastructure for another project or case of not following the exact same steps needed for the infrastructure creation on the console.&lt;br&gt;
Situations like this and more are the reasons why infrastructure as code (IaC) was created, to give developers the ability to write out code for their infrastructure which can be used multiple times.&lt;/p&gt;

&lt;p&gt;In this article, we would be looking at AWS very own infrastructure as code (IaC) tool called "CloudFormation", which is written in YAML language and creating a network infrastructure which consist of a Virtual Private Network (VPN), Subnet, Internet gateway, Elastic IP, NetGateway, Routing table.&lt;/p&gt;

&lt;p&gt;The code used for this Demo can be found &lt;a href="https://github.com/get2bash/Cloudformation-v1/blob/main/Project-network.yml"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Creating a CloudFormation stack
&lt;/h2&gt;

&lt;p&gt;To create a CloudFormation stack, the following AWS command will be passed into the terminal.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;create-stack: Desired stack name.&lt;/li&gt;
&lt;li&gt;template-body: Name of the YAML file containing the IaC.&lt;/li&gt;
&lt;li&gt;parameters: Key value pairs that can be used as parameter in the YAML file.&lt;/li&gt;
&lt;li&gt;region: Desired region in which the infrastructure will be created.
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws cloudformation create-stack \
  --stack-name AppDeploy \
  --template-body file://network.yml \
  --parameters ParameterKey=EnvironmentName,ParameterValue=AppDeploy \
  --region=us-east-1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When it is successful, the following output will be displayed on the terminal, showing the stack ID.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhqpxx0l0b74247ejiy2q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhqpxx0l0b74247ejiy2q.png" alt="stack creation initiation" width="800" height="58"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;On your CloudFormation dashboard in AWS console, it will display the name given to the stack and a status of CREATE_IN_PROGRESS.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuvv9eg5xoi35afy65jqp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuvv9eg5xoi35afy65jqp.png" alt="stack and a status" width="800" height="200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click the name of the stack, and check under the "resources" section to see the list of the resources indicated in the template that are being created.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl8na1exs02sues1g6fxg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl8na1exs02sues1g6fxg.png" alt="resources indicated in the template that are being created" width="800" height="375"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After successful creation of the resources, you can visit the VPC dashboard to view the just created VPC.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzqhrkt96z0d3o66zi2gi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzqhrkt96z0d3o66zi2gi.png" alt="new VPC created" width="800" height="146"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We were able to look at how to use CloudFormation for infrastructure provisioning by creating a group of networking resources which was deployed as a stack on the CloudFormation dashboard.&lt;/p&gt;

</description>
      <category>cloudcomputing</category>
      <category>aws</category>
      <category>beginners</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Optimizing Content Delivery: Unleashing the Power of Amazon CloudFront</title>
      <dc:creator>Isah Bashir Ibrahim </dc:creator>
      <pubDate>Sat, 28 Oct 2023 16:59:16 +0000</pubDate>
      <link>https://dev.to/aws-builders/optimizing-content-delivery-unleashing-the-power-of-amazon-cloudfront-fm7</link>
      <guid>https://dev.to/aws-builders/optimizing-content-delivery-unleashing-the-power-of-amazon-cloudfront-fm7</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;In an increasingly digital and interconnected world, delivering content swiftly and seamlessly to global audiences is vital for businesses across the world. CloudFront has revolutionized the way organizations distribute their digital content, enabling faster load times, improved user experiences, and enhanced scalability. In this article, we delve into the transformative power of CloudFront, exploring its features, benefits, and how to set it up.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is CloudFront?
&lt;/h2&gt;

&lt;p&gt;CloudFront is a globally distributed CDN that accelerates the delivery of static, dynamic, and streaming content to end users. Leveraging the power of AWS’s extensive global infrastructure, CloudFront ensures low latency and high-performance content delivery to users worldwide. It acts as a mediator between the origin server (where the content is stored) and the end user, minimizing the distance and network hops between them, resulting in faster loading times and reduced bandwidth costs.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Features and Benefits
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Global Reach: With numerous edge locations strategically placed across major cities worldwide, CloudFront ensures content is delivered from the nearest edge location to end-users, reducing latency and enabling faster content retrieval.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;High Performance: CloudFront utilizes advanced caching techniques, including edge caching and dynamic content acceleration, to optimize the delivery of both static and dynamic content. By caching frequently accessed content at edge locations, CloudFront minimizes the load on origin servers and improves response times.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Scalability: CloudFront is designed to handle high traffic volumes and sudden spikes in demand. It dynamically scales resources based on traffic patterns, ensuring content delivery remains fast and reliable even during traffic surges.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security: CloudFront provides several security features to protect content and end-users. It supports HTTPS encryption by default, securing data in transit.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Flexibility: CloudFront offers flexible content delivery options, allowing businesses to deliver content in various formats, including web pages, APIs, videos, and software downloads. It supports streaming media delivery for both on-demand and live-streaming scenarios, enabling efficient video distribution across different devices.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Additionally, it integrates with AWS Web Application Firewall (WAF) and AWS Shield for advanced protection against DDoS attacks and other web vulnerabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  Setting up CloudFront
&lt;/h2&gt;

&lt;p&gt;Log in to your AWS console or create an account if you don't own one.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx1esjg4lpuqbcnwqszee.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx1esjg4lpuqbcnwqszee.png" alt="Log in to AWS console"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Search for Cloudfront on the search bar and navigate to the page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F14yhfmtg0tozdr4gfphc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F14yhfmtg0tozdr4gfphc.png" alt="Searching for cloudfront service"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After navigating to the CloudFront dashboard, an option to create a CloudFront distribution would be displayed if it's your first time creating one or a list of previously created Cloudfront distributions would be displayed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy5p84zp2jkmlgquz7tac.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy5p84zp2jkmlgquz7tac.png" alt="CloudFront dashboard"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click the Create a CloudFront distribution and a new page will appear. On the "Origin domain" you have to input a domain name or an AWS resource that you can point the Cloudfront to, like S3 bucket, API gateway, Loadbalancer etc. In this example, I'm using an S3 bucket that is hosting a static webpage.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fggc37ufhcl5wdrum65mz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fggc37ufhcl5wdrum65mz.png" alt="Creation page"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While using Cloudfront, you have the option to enable a web application firewall which protects your site from DDoS and security vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9kdrnwlzafk41hbhtnqp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9kdrnwlzafk41hbhtnqp.png" alt="Firewall section"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Under the setting, you can select the collection of regions closest to you for a better distribution or select the "Use all edge location" which is the best for performance. After this section, go ahead and click the Create button to create the CloudFront distribution.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjhlym7a6yotzojrathqd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjhlym7a6yotzojrathqd.png" alt="Setting section"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After a few seconds, the dashboard of the CloudFront distribution just created will appear and notice the Distribution domain name which is the new domain that would be used as a CDN.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcjgpfcddcw5516nqffhz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcjgpfcddcw5516nqffhz.png" alt="Created distribution"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Copy the Distribution domain name into your web browser and notice the appended ".cloudfront.net" which shows that your site is distributed by CloudFront.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F15kf7z53vt2k1tblrjyt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F15kf7z53vt2k1tblrjyt.png" alt="Distributed webpage"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In conclusion, Amazon CloudFront is a frequently employed service for expediting the delivery of web applications, video streaming, and various online content to a worldwide audience, all while guaranteeing minimal delay and robust accessibility. It plays a pivotal part in enhancing efficiency, safeguarding assets, and enhancing the capacity for web services and applications.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
