<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Jake</title>
    <description>The latest articles on DEV Community by Jake (@jereck).</description>
    <link>https://dev.to/jereck</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3052309%2F14e7c9a9-b133-4e8d-8597-8944a6677158.jpeg</url>
      <title>DEV Community: Jake</title>
      <link>https://dev.to/jereck</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jereck"/>
    <language>en</language>
    <item>
      <title>The AWS Shared Responsibility Model — and How to Remember It Forever</title>
      <dc:creator>Jake</dc:creator>
      <pubDate>Wed, 16 Apr 2025 15:12:06 +0000</pubDate>
      <link>https://dev.to/jereck/the-aws-shared-responsibility-model-and-how-to-remember-it-forever-61i</link>
      <guid>https://dev.to/jereck/the-aws-shared-responsibility-model-and-how-to-remember-it-forever-61i</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;The AWS Shared Responsibility Model shows who is in charge of what when it comes to security in the cloud.&lt;br&gt;
It's easy to forget - but critical to understand. Especially for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS certifications 🧠&lt;/li&gt;
&lt;li&gt;Interviews 🤝&lt;/li&gt;
&lt;li&gt;Actually securing your cloud ☁️🔐
So lets break it down with a real-life analogy and my trick to remember it forever.&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;
  
  
  What It Is
&lt;/h2&gt;

&lt;p&gt;When you host something on AWS, security is a shared job:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS is responsible &lt;em&gt;for the security of the cloud&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;You are responsible &lt;em&gt;for the security in the cloud&lt;/em&gt; &lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;
  
  
  My Analogy: An Apartment Building
&lt;/h2&gt;

&lt;p&gt;Think of AWS as an apartment complex&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Who&lt;/th&gt;
&lt;th&gt;Responsibility&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;AWS (Landlord)&lt;/td&gt;
&lt;td&gt;Locks the front gate, maintains security cameras, keeps the building safe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;You (Tenant)&lt;/td&gt;
&lt;td&gt;Lock your apartment door, don't leave the stove on, decide who gets your Wi-Fi password&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;
&lt;h2&gt;
  
  
  Memory Trick
&lt;/h2&gt;

&lt;p&gt;Saying out loud: "AWS secures the cloud. I secure what's IN the cloud"&lt;br&gt;
Or if you're more of a visual learner:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;AWS = hardware, networking, data center
You = data, access, app logic, configs
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Mnemonic&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;OF&lt;/strong&gt; the Cloud = &lt;strong&gt;O&lt;/strong&gt;perations &amp;amp; &lt;strong&gt;F&lt;/strong&gt;acilities&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IN&lt;/strong&gt; the Cloud = &lt;strong&gt;I&lt;/strong&gt;nstances &amp;amp; &lt;strong&gt;N&lt;/strong&gt;etworks&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Real Examples
&lt;/h2&gt;

&lt;p&gt;Here are some real examples to put into practice&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;AWS Service&lt;/th&gt;
&lt;th&gt;AWS Responsibility&lt;/th&gt;
&lt;th&gt;Your Responsibility&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;EC2&lt;/td&gt;
&lt;td&gt;Physical Servers, Hypervisor&lt;/td&gt;
&lt;td&gt;Patching OS, firewall settings&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S3&lt;/td&gt;
&lt;td&gt;Infrastructure, Uptime&lt;/td&gt;
&lt;td&gt;Bucket Policies, Encryption Settings&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;RDS&lt;/td&gt;
&lt;td&gt;DB engine updates&lt;/td&gt;
&lt;td&gt;SQL Injection protection, User Permissions&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;You don't have to memorize every line of the AWS docs - just remember: &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;👉 AWS secures the cloud. You secure what’s in it.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Get that right, and you’re ahead of 80% of people trying to pass their cert or nail the “basic cloud security” interview question.&lt;/p&gt;




&lt;p&gt;I’m sharing more bite-sized AWS concepts as I study for my Developer Associate cert — follow along and feel free to drop your own memory tricks in the comments!&lt;/p&gt;

</description>
      <category>aws</category>
      <category>devops</category>
      <category>cloud</category>
    </item>
    <item>
      <title>AWS IAM: What It Is and Why Least Privilege Isn’t Optional</title>
      <dc:creator>Jake</dc:creator>
      <pubDate>Tue, 15 Apr 2025 12:05:49 +0000</pubDate>
      <link>https://dev.to/jereck/aws-iam-what-it-is-and-why-least-privilege-isnt-optional-e65</link>
      <guid>https://dev.to/jereck/aws-iam-what-it-is-and-why-least-privilege-isnt-optional-e65</guid>
      <description>&lt;p&gt;Think of &lt;strong&gt;AWS Identity and Access Management (IAM)&lt;/strong&gt; as the security gatekeeper for your AWS account. It decides &lt;strong&gt;who can access what&lt;/strong&gt;, and &lt;strong&gt;what they can do with it&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;When IAM is set up well, it protects your infrastructure like a pro. When it’s not? You're one bad permission away from a serious security breach.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔐 What Is IAM?
&lt;/h2&gt;

&lt;p&gt;IAM lets you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create &lt;strong&gt;users&lt;/strong&gt;, &lt;strong&gt;groups&lt;/strong&gt;, and &lt;strong&gt;roles&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Attach &lt;strong&gt;policies&lt;/strong&gt; to define what actions they can perform&lt;/li&gt;
&lt;li&gt;Control access to AWS services and resources (like S3 buckets, EC2 instances, etc.)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;IAM isn’t just about functionality — it’s about &lt;strong&gt;security&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  ⚖️ The Principle of Least Privilege
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;“Only give permissions necessary to do the job — nothing more.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This principle minimizes the potential damage from mistakes or malicious activity.&lt;/p&gt;

&lt;h3&gt;
  
  
  ❌ Bad Example:
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"Effect"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Allow"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"Action"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"s3:*"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"Resource"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"*"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This allows a user to do anything in all S3 buckets — way too much power.&lt;/p&gt;

&lt;h3&gt;
  
  
  ✅ Good Example:
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"Effect"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Allow"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"Action"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"s3:GetObject"&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"Resource"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"arn:aws:s3:::my-bucket-name/*"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now the user can only read objects in a specific bucket. Safer, cleaner, better.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛡 Why It Matters
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;In 2019, Capital One suffered a major breach due to an over-permissive IAM role.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Misconfigured IAM is one of the top causes of cloud security failures.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Least privilege isn’t just a best practice — it’s basic cloud hygiene.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  👣 Takeaways
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;IAM controls access — treat it like a vault key.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Always ask: “Does this user/role need this permission?”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use AWS managed policies to start, then customize as needed.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>aws</category>
      <category>iam</category>
      <category>cloud</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
