<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ifeanyi Duru</title>
    <description>The latest articles on DEV Community by Ifeanyi Duru (@mindedvisions).</description>
    <link>https://dev.to/mindedvisions</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1389523%2F9354e594-399b-45bf-8e5c-a42016663b3e.jpg</url>
      <title>DEV Community: Ifeanyi Duru</title>
      <link>https://dev.to/mindedvisions</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mindedvisions"/>
    <language>en</language>
    <item>
      <title>Setting up Secure and Scalable Storage Architecture With Low Latency</title>
      <dc:creator>Ifeanyi Duru</dc:creator>
      <pubDate>Sat, 06 Apr 2024 14:50:32 +0000</pubDate>
      <link>https://dev.to/mindedvisions/setting-up-secure-and-scalable-storage-architecture-with-low-latency-357p</link>
      <guid>https://dev.to/mindedvisions/setting-up-secure-and-scalable-storage-architecture-with-low-latency-357p</guid>
      <description>&lt;p&gt;&lt;em&gt;This project focuses on establishing a storage infrastructure that is both scalable and secure, while also ensuring minimal latency.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding AWS S3 Bucket
&lt;/h2&gt;

&lt;p&gt;An AWS S3 Bucket is a cloud-based object storage service provided by Amazon Web Services (AWS), it is a virtual container within Amazon Simple Storage Service (S3) that acts like a digital file folder and is also designed to store and retrieve any amount of data from anywhere on the web. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here are some key features and functionalities of the S3 Bucket:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scalability:&lt;/strong&gt; S3 is highly scalable, meaning it can accommodate a virtually unlimited amount of data. As your storage requirements grow, S3 automatically scales to meet your needs without any upfront provisioning.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Durability:&lt;/strong&gt; Stores data redundantly across multiple facilities to ensure exceptional data durability of almost 100%. This high level of durability is achieved by replicating data across multiple geographically dispersed data centers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security:&lt;/strong&gt; S3 offers various security features to help you protect your data. This includes access control mechanisms such as bucket policies and Access Control Lists (ACLs), encryption options for data in transit and at rest, and integration with AWS Identity and Access Management (IAM) for fine-grained access control.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Versioning:&lt;/strong&gt; S3 supports versioning, which allows you to keep multiple versions of an object in the same bucket. This feature helps protect against accidental deletion or overwrite of objects.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost-Effectiveness:&lt;/strong&gt; Provides various storage classes to optimize costs based on your data access frequency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Integration with Other AWS Services:&lt;/strong&gt; S3 integrates seamlessly with other AWS services, making it easy to use as a storage backend for applications hosted on AWS. For example, you can use S3 to host static websites, store backups for Amazon EC2 instances, or serve as a data lake for analytics workloads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Logging and Monitoring:&lt;/strong&gt; S3 provides logging capabilities to track access to your bucket and objects, allowing you to audit and monitor usage. Additionally, you can configure event notifications to trigger AWS Lambda functions or other AWS services in response to specific bucket events.&lt;/p&gt;

&lt;p&gt;We have three (3) tasks to accomplish in this project, namely;&lt;/p&gt;

&lt;p&gt;Task 1: Data stored in the S3 bucket must not have a single point of failure.&lt;/p&gt;

&lt;p&gt;Task 2: Create a narration.txt file and store financial information in it. Without granting IAM access, create a temporary link that will expire after 10 minutes to someone in the IT department.&lt;/p&gt;

&lt;p&gt;Task 3: Create an s3 bucket and upload an object, but you are not allowed to execute this task using the console, what would be your approach?&lt;/p&gt;

&lt;p&gt;Before going into our first task, we need to create an s3 bucket.&lt;/p&gt;

&lt;p&gt;To sign in to the AWS Management Console, &lt;br&gt;
visit &lt;a href="https://console.aws.amazon.com/"&gt;https://console.aws.amazon.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fihurx18szcempta7jmg0.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fihurx18szcempta7jmg0.PNG" alt="Image description" width="800" height="428"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then navigate to S3 by clicking on the "Services" dropdown menu at the top-left corner and select "S3" under the "Storage" section.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4ftu49zjtvlxn7yxkiht.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4ftu49zjtvlxn7yxkiht.PNG" alt="Image description" width="800" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa1o9axi5n2y77b4ru7ej.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa1o9axi5n2y77b4ru7ej.PNG" alt="Image description" width="800" height="196"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click on Create S3 bucket.&lt;/p&gt;

&lt;h2&gt;
  
  
  TASK 1
&lt;/h2&gt;

&lt;p&gt;Data stored in the S3 bucket must not have a single point of failure.&lt;/p&gt;

&lt;p&gt;To achieve more than one point of failure, enable cross-region replication and implement multiple availability zones/regions in the S3 bucket creation. Select a region closer to the region where the bucket is created, then select the directory option. Choose an availability zone closer to the AWS region that was selected. &lt;/p&gt;

&lt;p&gt;Then create bucket.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuqfnc31ok3ruazllrwvx.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuqfnc31ok3ruazllrwvx.PNG" alt="Image description" width="800" height="431"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1jo9fty7svpo5zag9yfy.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1jo9fty7svpo5zag9yfy.PNG" alt="Image description" width="800" height="432"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Task 2: &lt;/p&gt;

&lt;p&gt;Create a narration.txt file and store financial information in it. Without granting IAM access, create a temporary link that will expire after 10 minutes to someone in the IT department.&lt;/p&gt;

&lt;p&gt;navigate into the bucket by clicking on its name. Then click on the "Upload" button.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flfsu9vom1cnkjqa1t1qz.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flfsu9vom1cnkjqa1t1qz.PNG" alt="Image description" width="800" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click on the "Add files" button and select the narration.txt file containing the financial information from your local file system.&lt;/p&gt;

&lt;p&gt;To create a temporary link that will expire after 10 minutes to someone in the IT department, we will need to configure AWS in CLI.&lt;/p&gt;

&lt;p&gt;Step 1&lt;br&gt;
To do this, Go to IAM Dashbaord and navigate to users, click on the user you want to use.&lt;/p&gt;

&lt;p&gt;Step 2&lt;br&gt;
Click on Security Credentials, Under Access keys, click on create access keys.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiqqp624f2o40llj934kz.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiqqp624f2o40llj934kz.PNG" alt="Image description" width="800" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3&lt;br&gt;
Choose Command Line Interface(CLI) and give it a description then create. DO write down or download the keys&lt;/p&gt;

&lt;p&gt;Step 4&lt;br&gt;
Open Command Prompt(cmd) and configure aws usng &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;aws configure&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4m7u3lwd23souym83qx2.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4m7u3lwd23souym83qx2.PNG" alt="Image description" width="800" height="148"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 5 &lt;br&gt;
type this command &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;aws s3 presign s3://your-bucket-name/account.txt --expires-in 600&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fovr92nmbbrfgyd1nd6pm.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fovr92nmbbrfgyd1nd6pm.PNG" alt="Image description" width="800" height="136"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Task 3:&lt;br&gt;
Create an s3 bucket and upload an object, but you are not allowed to execute this task using the console, what would be your approach?&lt;/p&gt;

&lt;p&gt;If I cannot use the AWS Management Console to create an S3 bucket and upload an object, I can achieve this task using the AWS Command Line Interface (CLI)&lt;/p&gt;

&lt;p&gt;Using the 'aws s3 mb s3://mybucket' command, I would create a new S3 bucket. I would specify the bucket name and the region where I want to create the bucket.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkz3rtujgf3uxk3xmsak.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkz3rtujgf3uxk3xmsak.PNG" alt="Image description" width="800" height="414"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To upload an image in the bucket, do the following command.&lt;/p&gt;

&lt;p&gt;aws s3 cp /path/to/local/file/example.txt s3://my-bucket-name/example.txt&lt;/p&gt;

&lt;p&gt;By following these steps, I would be able to create an S3 bucket and upload an object without using the AWS Management Console, leveraging the AWS CLI for automation and scripting purposes.&lt;/p&gt;

&lt;p&gt;Thanks for following through on this point. Do comment and subscribe  &lt;/p&gt;

</description>
      <category>webdev</category>
      <category>aws</category>
      <category>s3</category>
      <category>bucket</category>
    </item>
    <item>
      <title>The Big Shift: How Cloud Computing Took Over the World</title>
      <dc:creator>Ifeanyi Duru</dc:creator>
      <pubDate>Fri, 29 Mar 2024 18:09:08 +0000</pubDate>
      <link>https://dev.to/mindedvisions/the-big-shift-how-cloud-computing-took-over-the-world-2map</link>
      <guid>https://dev.to/mindedvisions/the-big-shift-how-cloud-computing-took-over-the-world-2map</guid>
      <description>&lt;p&gt;Cloud computing has become essential in handling information these days. This article explores how this technology went from a cool idea to something everyone uses. We'll look at where it all began, what major moments shaped it, and how it changed the use of computers.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;From Dream to Reality&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The early 2000s saw tech visionaries develop a new way to deliver computing power over the internet. Big names like Amazon, Google, and Salesforce were the first to make this a reality, paving the way for a massive change in the IT world.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Key Moments in Cloud Computing&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;2006: The Cloud Opens for Business - Amazon Web Services (AWS) launches, offering on-demand cloud storage and computing that can grow as needed. This marked the start of a new age for cloud infrastructure.&lt;br&gt;
Software on Demand Takes Off - Companies like Salesforce, Google, and Microsoft have started offering software that runs online, eliminating the need to install and maintain it on individual computers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Building Apps in the Cloud Gets Easier - Platforms like Google App Engine and Microsoft Azure appear, giving developers tools to create, deploy, and scale their applications without managing the servers themselves.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Mixing and Matching Clouds - Businesses start using a mix of public cloud services, their servers, and even clouds from different providers. This lets them find the best balance of performance, cost, and reliability.&lt;br&gt;
How Cloud Computing Changed Everything&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Growing When You Need To, Shrinking When You Don't - Cloud computing lets businesses add or remove resources as needed, making it perfect for workloads that change over time. It also helps them use their resources more efficiently.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Saving Money - With cloud services, businesses only pay for what they use. This cuts down on upfront costs and ongoing expenses, making cloud computing a good option for companies of all sizes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Speeding Up Innovation - Cloud services give developers access to cutting-edge technologies like artificial intelligence and big data analysis. This lets them create new things and drive digital transformation faster.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Reaching the Whole World - Cloud providers have data centers all over the globe. This lets businesses deploy apps and services closer to their users, which means things run faster and smoother.&lt;br&gt;
Challenges and the Road Ahead&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cloud computing is great, but it also comes with challenges like data security, following regulations, and getting locked into a single provider's system. However, careful planning, good management practices, and strong security measures can help businesses avoid these risks and get the most out of the cloud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Future is Cloudy (and Bright!)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cloud computing has gone from a niche technology to something critical for businesses to be innovative and adaptable. As more and more companies move to the cloud, the future holds even more possibilities for using cloud computing to succeed in the digital age.&lt;/p&gt;

&lt;p&gt;Thanks for reading. Do comment and share.&lt;/p&gt;

&lt;p&gt;Cheers.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>cloud</category>
      <category>computing</category>
      <category>devops</category>
    </item>
    <item>
      <title>Introduction to AWS IAM: Identity and Access Management.</title>
      <dc:creator>Ifeanyi Duru</dc:creator>
      <pubDate>Thu, 28 Mar 2024 19:28:40 +0000</pubDate>
      <link>https://dev.to/mindedvisions/creating-a-new-project-on-aws-as-a-beginner-2p1m</link>
      <guid>https://dev.to/mindedvisions/creating-a-new-project-on-aws-as-a-beginner-2p1m</guid>
      <description>&lt;p&gt;&lt;strong&gt;Overview:&lt;/strong&gt; AWS Identity and Access Management (IAM) offers comprehensive management of permissions within your AWS account, allowing precise regulation of user access to specific services and resources. With IAM policies, you can tailor permissions for users or applications, ensuring they only have access to the resources necessary for their tasks, and defining conditions for how and when access is granted.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Key Components of IAM:&lt;/strong&gt;
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Users: Users are entities that represent individual people, applications, or services that interact with AWS. Each user has a unique name and credentials (username and password or access keys) for accessing AWS resources.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Groups: Groups are collections of users. Instead of attaching policies directly to individual users, you can create groups, assign policies to them, and then add users to those groups. This simplifies permission management, especially in larger organizations with multiple users.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Policies: Policies are JSON documents that define permissions. You can attach policies to users, groups, or roles to grant or restrict access to AWS resources. Policies specify what actions are allowed or denied on which resources. AWS provides managed policies with predefined permissions, or you can create custom policies tailored to your specific needs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Roles: Roles are similar to users, but they are not associated with a specific person or identity. Instead, roles are meant to be assumed by entities such as AWS services, applications, or users from another AWS account. Roles define a set of permissions, and when an entity assumes a role, it temporarily takes on those permissions.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Core Concepts:&lt;/strong&gt;
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Authentication: The process of verifying the identity of a user, application, or service. IAM supports various authentication methods, including username/password authentication for users, and access keys for programmatic access by applications or scripts.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Authorization: Determining what actions a user, group, or role is allowed to perform on AWS resources. This is controlled through IAM policies, which define the permissions associated with each entity.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Least Privilege: Following the principle of least privilege means granting users, groups, and roles only the permissions they need to perform their intended tasks, and no more. This reduces the risk of unauthorized access and potential security breaches.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Project Objective&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In this project, the following tasks will be accomplished. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Create a user, &lt;/li&gt;
&lt;li&gt;⁠Create a group and add the user to the group, &lt;/li&gt;
&lt;li&gt;⁠Attach 3 policies to that group: the user must have the ability to create IAM user, vpc, and s3 policies, &lt;/li&gt;
&lt;li&gt;⁠Create a customized customer-managed policy to deny a user access to creating an RDS instance snapshot and allow the user to create an EC2 instance,&lt;/li&gt;
&lt;li&gt;⁠Create an organization: add two accounts to the organization 1: Developer account and 2: An operations account and switch roles between the accounts.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A step-by-step pictorial approach will be used for better guidance and understanding.&lt;/p&gt;

&lt;p&gt;To start with, Open your web browser and go to the AWS Management Console at &lt;a href="https://aws.amazon.com/console/"&gt;https://aws.amazon.com/console/&lt;/a&gt;.&lt;br&gt;
Sign in using your AWS account credentials.&lt;/p&gt;

&lt;p&gt;Once you're logged in, navigate to the IAM dashboard.&lt;/p&gt;

&lt;p&gt;In the top-left corner, search for "IAM" in the services search bar, and select "IAM" from the results.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fysvr0z8qe8df0yp79eya.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fysvr0z8qe8df0yp79eya.png" alt="Image description" width="624" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IAM allows you to manage access to AWS services and resources securely.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 1:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Click on users in the left-hand corner to create a user. Then click on create a user.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafd5ivb6p64k0aqo5dlx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafd5ivb6p64k0aqo5dlx.png" alt="Image description" width="624" height="316"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Input your desired user name, then click next.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6nn73xipfi15kot8z32o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6nn73xipfi15kot8z32o.png" alt="Image description" width="624" height="316"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fisj2yy7ftd7l92yl0tok.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fisj2yy7ftd7l92yl0tok.png" alt="Image description" width="624" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 2:&lt;/strong&gt;&lt;br&gt;
Next, our task is to create a user group and add the user into the group. &lt;/p&gt;

&lt;p&gt;To achieve this, click on create user group. Input the group user name and click on create user group.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxpo227rlxnxfak5kpqyp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxpo227rlxnxfak5kpqyp.png" alt="Image description" width="624" height="317"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcmowwvldkjh9nnzo979q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcmowwvldkjh9nnzo979q.png" alt="Image description" width="624" height="309"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We then need to add the user to the group we created. To get this done, click on the group name and then click on add users.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffg1awvigisgz7hiqadeq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffg1awvigisgz7hiqadeq.png" alt="Image description" width="624" height="315"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then input the user name in the search bar and add user to the group.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1p8jnxcvd7qocmlqj71g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1p8jnxcvd7qocmlqj71g.png" alt="Image description" width="624" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flf85lxjq03pdvn6swn5x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flf85lxjq03pdvn6swn5x.png" alt="Image description" width="624" height="314"&gt;&lt;/a&gt;&lt;br&gt;
We have successfully created a user and added the user to a group.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 3:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;The next step is to attach policies to the user group we created.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To attach policies click on permissions by the right of users tab.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8vqoipfup7xcun0eacas.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8vqoipfup7xcun0eacas.png" alt="Image description" width="624" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;then click on the add permission arrow on the right-hand side, and click on attach policies.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi4zlips831yd26sojbiq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi4zlips831yd26sojbiq.png" alt="Image description" width="624" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;On the permission policies screen, to add IAM policy, search for IAMfullacess.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwxkk75c1v3eoi60dk6qu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwxkk75c1v3eoi60dk6qu.png" alt="Image description" width="624" height="315"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg34skcl2gczl2p1qhm1s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg34skcl2gczl2p1qhm1s.png" alt="Image description" width="624" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;check on IAMfullacess and click attach policies &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fur5dh1i7kuq41yms4hu6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fur5dh1i7kuq41yms4hu6.png" alt="Image description" width="624" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feb8z7xkuok0zld881zrp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feb8z7xkuok0zld881zrp.png" alt="Image description" width="624" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;IAMfullacess policy has been successfully attached to the group.&lt;/p&gt;

&lt;p&gt;Repeat the above steps to attach vpc and s3 policies to the group.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0s876g3jjh1cxiulx77k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0s876g3jjh1cxiulx77k.png" alt="Image description" width="624" height="315"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foyzlic5awkl9f0dsl3kz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foyzlic5awkl9f0dsl3kz.png" alt="Image description" width="624" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3k40f6eqkbegsj5coo0d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3k40f6eqkbegsj5coo0d.png" alt="All 3 policies attached" width="624" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;All three policies have been attached to the group.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 4:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Now, we have to customize a customer-managed policy to deny a user from creating an RDS instance snapshot, while allowing the user to create an EC2 instance. *&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;To create a customized policy, we will click on the permission policy arrow by the right hand, then click on create an inline policy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkw02h6tsoa0m06hnzays.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkw02h6tsoa0m06hnzays.png" alt="Image description" width="624" height="315"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9eaf4u63q20rhuan38rh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9eaf4u63q20rhuan38rh.png" alt="Image description" width="624" height="315"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;On services, choose RDS&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frg8zbkeo2xer9bwt39k5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frg8zbkeo2xer9bwt39k5.png" alt="Image description" width="624" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Select All RDS and all resources, then select deny, and click next.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx7soz0xh9vjsvntttem7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx7soz0xh9vjsvntttem7.png" alt="Image description" width="624" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then create policy.&lt;/p&gt;

&lt;p&gt;To allow the user to create an EC2 instance, go to inline policy, and click on services, then click on EC2.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F99p6889czodf2dvi2anf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F99p6889czodf2dvi2anf.png" alt="Image description" width="624" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdgnmp05he1r36b0fdorj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdgnmp05he1r36b0fdorj.png" alt="Image description" width="624" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;All policies have been applied.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 5:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The last task of this project is to create two accounts and be able to switch between roles.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Creating accounts under the AWS organization to switch roles.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First, go to AWS organization and click on create an account, fill in the details, and create an account.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzo8vohjfavqzefmguhqn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzo8vohjfavqzefmguhqn.png" alt="Image description" width="626" height="311"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb3ah4cf26pprwrwqdp9a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb3ah4cf26pprwrwqdp9a.png" alt="Image description" width="624" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After creating an account, we will need to create roles for each account. To do this, navigate to role in IAM features, then create roles.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flcjkx947u2mnkza41uef.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flcjkx947u2mnkza41uef.png" alt="Image description" width="624" height="310"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Under trusted entity type, select AWS account and under an AWS account choose this account, then next.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhgut6w37jcjwsbhjlcw0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhgut6w37jcjwsbhjlcw0.png" alt="Image description" width="624" height="315"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Attach administrator access to the role, click next.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpyfiz86sd3eq4i1k1cjv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpyfiz86sd3eq4i1k1cjv.png" alt="Image description" width="624" height="316"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Put in the role name and create role.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhflwfe9cwvrmerzwzvjr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhflwfe9cwvrmerzwzvjr.png" alt="Image description" width="624" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Do this for any more roles you want to create.&lt;/p&gt;

&lt;p&gt;To switch roles, navigate to IAM dashboard and click on the top right corner arrow, then click on switch role.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyvhzs42rjbsurmypuu8y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyvhzs42rjbsurmypuu8y.png" alt="Image description" width="624" height="307"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Put in the account ID and the ARN characters from the account role then switch.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv25sbive0y4gjgv99xvn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv25sbive0y4gjgv99xvn.png" alt="Image description" width="624" height="320"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks for reading through to this point. I'm assured you have gotten insightful steps to guide you on exploring the AWS IAM feature. &lt;/p&gt;

&lt;p&gt;Feel free to comment and ask questions where necessary, I'll be glad to respond.&lt;/p&gt;

&lt;p&gt;Cheers.&lt;/p&gt;

</description>
      <category>user</category>
      <category>group</category>
      <category>policies</category>
      <category>roles</category>
    </item>
  </channel>
</rss>
