<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: warris oladipupo</title>
    <description>The latest articles on DEV Community by warris oladipupo (@warrisoladipup2).</description>
    <link>https://dev.to/warrisoladipup2</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F999594%2Fd2249201-38ed-495f-99f2-3401e378be2f.jpg</url>
      <title>DEV Community: warris oladipupo</title>
      <link>https://dev.to/warrisoladipup2</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/warrisoladipup2"/>
    <language>en</language>
    <item>
      <title>IAM</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Sat, 29 Jun 2024 16:44:26 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/iam-2ga3</link>
      <guid>https://dev.to/warrisoladipup2/iam-2ga3</guid>
      <description>&lt;p&gt;What can &lt;em&gt;&lt;strong&gt;iam(identity access management)&lt;/strong&gt;&lt;/em&gt; do to you as an organization or individuals?. let me help you to get the basic knowledge about it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IAM&lt;/strong&gt; is a service that allows you to manage users and their access to the AWS console. With IAM, you can create users, grant permissions, and manage access to your AWS resources. It also enables you to create groups and roles ,  let say you have a company called "TechGuru" , your company will have software developer , HR manager, E.T.C,  now these people will need resources of the company to work with thereby, you need to create users for each of your workers right?, yes IAM can help you to do that and your company might have various department which this department are groups and they will also need resources to work with , IAM can also help you to do that.&lt;/p&gt;

&lt;p&gt;Now let learn how to create users for your workers and also adding then to groups if needed&lt;/p&gt;

&lt;p&gt;Sign in to the AWS Console: Log in using your root account credentials.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhfwgtkoanqye5aoy4e0j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhfwgtkoanqye5aoy4e0j.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;search for IAM  and click on the IAM&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhrsmewv1mes744ceudjw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhrsmewv1mes744ceudjw.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now click on create user &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg8emgbc9jytu8xgm1mev.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg8emgbc9jytu8xgm1mev.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;now input the name of the user and the user can generate his/her passwords but in this case i will allow aws to generate a password for me &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F66zqx9vcn3xuuk6mmkn9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F66zqx9vcn3xuuk6mmkn9.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can learn that a user can only change his/her password and username but can not access the company resources unless he/she is given permission.  Before we give the permissions  , let imagine the user we just created is part of IT department , let create a group for IT department because any permission we assign to the group, any user within that group can have this permission ,so we don’t need to give each user permission, they will just inherit it from the group.&lt;br&gt;
if you look at the picture down here 👇 you will see "add user to the group " since we don’t have a group, let create a group by clicking on create group&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9933o0q85gdqowimi6rw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9933o0q85gdqowimi6rw.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;looking at the image below , i have given the group name "IT DEPARTMENT" &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7mjz3yw3xxc6y83eadlm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7mjz3yw3xxc6y83eadlm.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now before we click on create user , we need to give it permission&lt;br&gt;
what are permission ?  Permissions in AWS are controlled using IAM policy documents, which are written in JSON (JavaScript Object Notation). These documents specify what actions are allowed or denied for a particular user, group, or role.&lt;/p&gt;

&lt;p&gt;Here’s a basic example of a JSON policy document:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": "*",
      "Resource": "*"
    }
  ]
}

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;now if you don't understand what this code above is , don't worry , we will cover that in the later lesson&lt;br&gt;
Now let give our group permission&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqvz9kdqmtcs3anofdjig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqvz9kdqmtcs3anofdjig.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From the picture above we have given the group some permission, now let create the group &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F49ym4fdl6smoqkdqb4d3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F49ym4fdl6smoqkdqb4d3.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we can see that our group is created and i have clicked on the group and now we can create user by clicking on the next button&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyvlor7llqtnig8gnt6hp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyvlor7llqtnig8gnt6hp.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;looking at the picture above this is just the review section , so let check if everything is okay and correct, let click on create user&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6b8p28rlkw16bahm06t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6b8p28rlkw16bahm06t.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;br&gt;
looking at the picture above we can see that we have create a user &lt;br&gt;
you can download load the .cv file to see the user credential  , now let return to our user list to see our user&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq066vqc3x0qiy9p9v2l7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq066vqc3x0qiy9p9v2l7.png" alt="Image description" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now our user is created.&lt;br&gt;
Join me next week as we dive into s3(Simple Storage Services)&lt;br&gt;
Thank you.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Pricing and Cost Management</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Wed, 19 Jun 2024 21:53:50 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/pricing-and-cost-management-2p20</link>
      <guid>https://dev.to/warrisoladipup2/pricing-and-cost-management-2p20</guid>
      <description>&lt;p&gt;&lt;strong&gt;Budgets&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Budgets allow you to set custom thresholds for your AWS spending and usage, alerting you when you exceed these thresholds.&lt;br&gt;
Scenario: You set a budget of $500 per month for your development environment. If your costs approach this limit, AWS Budgets sends you an alert, allowing you to investigate and take action before overspending.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost and Usage Reports&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Cost and Usage Report provides detailed information about your AWS usage and costs.&lt;br&gt;
Scenario: You need to analyze the cost trends of your AWS resources over the past year. The Cost and Usage Report gives you a comprehensive view of your spending.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost Explorer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cost Explorer helps you visualize and forecast your AWS costs and usage over time.&lt;br&gt;
Scenario: You want to predict next month's AWS costs based on historical usage. Cost Explorer helps you visualize past trends and forecast future expenses.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;&lt;em&gt;Management and Governance&lt;/em&gt;&lt;/strong&gt;&lt;/u&gt;&lt;br&gt;
&lt;strong&gt;Organizations&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Organizations allow you to centrally manage multiple AWS accounts under one organization.&lt;br&gt;
Scenario: Your company has different departments using separate AWS accounts. Using AWS Organizations, you can manage billing and policies centrally.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Control Tower&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Control Tower helps you set up and govern a secure, multi-account AWS environment based on AWS best practices.&lt;br&gt;
Scenario: You need to ensure all AWS accounts within your organization comply with company policies. Control Tower sets up a landing zone with guardrails to enforce these policies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Systems Manager&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Systems Manager provides operational insights and management of AWS resources.&lt;br&gt;
Scenario: You manage multiple EC2 instances and need to automate routine tasks. Systems Manager allows you to run commands, manage patches, and monitor performance from a single console.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Support Plans&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Trusted Advisor&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Trusted Advisor provides real-time guidance on following AWS best practices in terms of cost optimization, performance, security, and fault tolerance.&lt;br&gt;
Scenario: Trusted Advisor alerts you to security gaps, such as open ports on EC2 instances, allowing you to quickly address these issues.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Basic Support&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Basic Support is free for all AWS accounts and includes access to customer service and certain AWS Trusted Advisor checks.&lt;br&gt;
Scenario: You’re a new AWS user and need help with account setup. Basic Support provides access to documentation and AWS support forums.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Developer Support&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Developer Support starts at $29 per month and is intended for testing and development environments.&lt;br&gt;
Scenario: You're developing a new application and need technical support for troubleshooting. Developer Support provides resources and technical guidance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business Support&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Business Support starts at $100 per month and is recommended for production workloads.&lt;br&gt;
Scenario: Your application is in production, and you need 24/7 access to AWS technical support. Business Support ensures you have the necessary support.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enterprise Support&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Enterprise Support starts at $15,000 per month and is recommended for business-critical applications.&lt;br&gt;
Scenario: Your business relies on AWS for mission-critical services and requires a dedicated Technical Account Manager (TAM) and 24/7 support. Enterprise Support provides this high level of service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Additional Services&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Marketplace&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Marketplace is a digital catalog where you can purchase or license prebuilt software solutions.&lt;br&gt;
Scenario: You need a specialized analytics tool for your project. AWS Marketplace offers a variety of third-party solutions that you can quickly deploy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS Partner Network (APN)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;APN is a global community of partners offering software solutions and consulting services for AWS.&lt;br&gt;
Scenario: Your company needs help with a complex migration to AWS. APN partners can provide the expertise and tools required for a smooth transition.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Managed Services&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Managed Services help you operate your AWS infrastructure efficiently, ensuring best practices.&lt;br&gt;
Scenario: You lack the internal resources to manage your AWS environment. AWS Managed Services take over the operational management, allowing you to focus on your core business.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Professional Services&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Professional Services assist enterprises in transitioning to cloud-based operations.&lt;br&gt;
Scenario: Your organization needs to migrate a legacy system to AWS. Professional Services provide the strategy and execution support needed for this migration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS License Manager&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;License Manager helps manage software licenses for your AWS resources.&lt;br&gt;
Scenario: You use various software licenses for your applications. License Manager tracks these licenses, ensuring compliance and optimizing usage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS Certificate Manager&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Certificate Manager helps provision and manage SSL/TLS certificates for your AWS resources.&lt;br&gt;
Scenario: You need to secure your website with HTTPS. AWS Certificate Manager provisions and renews SSL/TLS certificates automatically.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Security and Compliance</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Thu, 06 Jun 2024 13:39:32 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/security-and-compliance-4d8m</link>
      <guid>https://dev.to/warrisoladipup2/security-and-compliance-4d8m</guid>
      <description>&lt;p&gt;&lt;strong&gt;&lt;u&gt;Shared Responsibility Model&lt;/u&gt;&lt;/strong&gt;: This model defines what security responsibilities are handled by AWS and what is handled by the customer/you.&lt;br&gt;
_Scenario:_You’re hosting an application on AWS. AWS is responsible for the physical security of the servers, while you are responsible for managing your data and access controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Well-Architected Framework:&lt;/u&gt;&lt;/strong&gt; This framework consists of five pillars (Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization) that provide best practices for designing reliable, secure, efficient, and cost-effective systems in the cloud.&lt;br&gt;
&lt;em&gt;Scenario:&lt;/em&gt; You’re designing a scalable e-commerce platform. The Well-Architected Framework helps ensure it remains secure, reliable, and cost-efficient even as traffic grows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;&lt;em&gt;Security Basics&lt;/em&gt;&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1.&lt;strong&gt;&lt;u&gt;Identity and Access Management (IAM)&lt;/u&gt;&lt;/strong&gt;: IAM enables you to manage users and their access to AWS services and resources securely.&lt;br&gt;
•Scenario: You’re setting up a team project on AWS. You create IAM users for each team member and assign roles with specific permissions to ensure they only access what they need.&lt;br&gt;
2.&lt;strong&gt;&lt;u&gt;Web Application Firewall (WAF)&lt;/u&gt;&lt;/strong&gt;: WAF helps protect your web applications by filtering and monitoring HTTP and HTTPS requests.&lt;br&gt;
•Scenario: Your website is getting attacked by bots trying to exploit vulnerabilities. WAF blocks these malicious requests, keeping your site secure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Threat Protection&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1.&lt;strong&gt;&lt;u&gt;Shield&lt;/u&gt;&lt;/strong&gt;: &lt;br&gt;
Shield is a managed DDoS protection service that safeguards applications from DDoS attacks.&lt;br&gt;
Scenario: Your online service experiences a massive influx of traffic due to a DDoS attack. Shield mitigates the attack, ensuring your service remains available.&lt;br&gt;
2.&lt;strong&gt;&lt;u&gt;Macie&lt;/u&gt;&lt;/strong&gt;: &lt;br&gt;
Macie uses machine learning to discover, classify, and protect sensitive data.&lt;br&gt;
•Scenario: You store customer information in S3 buckets. Macie scans these buckets, identifies sensitive data like credit card numbers, and helps you secure it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Configuration and Monitoring&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1.&lt;strong&gt;&lt;u&gt;Config&lt;/u&gt;&lt;/strong&gt;:&lt;br&gt;
AWS Config allows you to assess, audit, and evaluate the configurations of your AWS resources.&lt;br&gt;
•Scenario: You need to ensure your resources comply with company policies. Config tracks changes and assesses compliance automatically.&lt;br&gt;
2.&lt;strong&gt;&lt;u&gt;GuardDuty&lt;/u&gt;&lt;/strong&gt;: &lt;br&gt;
GuardDuty is an intelligent threat detection service that continuously monitors for malicious activity and unauthorized behavior.&lt;br&gt;
•Scenario: GuardDuty detects unusual API calls indicating a potential breach. You investigate and mitigate the threat promptly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Vulnerability and Compliance Management&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1.&lt;strong&gt;&lt;u&gt;Inspector&lt;/u&gt;&lt;/strong&gt;: &lt;br&gt;
Inspector assesses your EC2 instances for vulnerabilities and deviations from best practices.&lt;br&gt;
•Scenario: You launch a new EC2 instance. Inspector runs a security assessment and provides a report highlighting potential vulnerabilities for you to address.&lt;br&gt;
2.&lt;strong&gt;&lt;u&gt;Artifact&lt;/u&gt;&lt;/strong&gt;: &lt;br&gt;
Artifact provides on-demand access to AWS’s compliance and security reports.&lt;br&gt;
•Scenario: Your company needs proof of AWS compliance for an audit. Artifact supplies the necessary compliance reports.&lt;/p&gt;

&lt;p&gt;1.&lt;strong&gt;&lt;u&gt;Cognito&lt;/u&gt;&lt;/strong&gt;:&lt;br&gt;
Cognito helps you add user sign-up, sign-in, and access control to your web and mobile applications.&lt;br&gt;
•Scenario: You’re developing a mobile app and need user authentication. Cognito provides a user pool for registration and sign-in functionalities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Encryption&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Encryption is the process of converting data into a code to prevent unauthorized access. It is a critical component of data security in the cloud.&lt;/p&gt;

&lt;p&gt;Scenario: You need to ensure that sensitive customer data stored in an S3 bucket is protected from unauthorized access. By encrypting the data, you can ensure it remains secure even if someone gains unauthorized access to the storage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Key Management Service (KMS)&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;KMS is a managed service that allows you to create and manage encryption keys. It simplifies the process of encrypting your data and managing keys securely.&lt;/p&gt;

&lt;p&gt;Scenario: You have an application that processes sensitive information. You use KMS to generate and store encryption keys, ensuring that your data is encrypted both at rest and in transit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;CloudHSM&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;CloudHSM is a hardware security module that allows you to generate and use your encryption keys within dedicated hardware. It provides a higher level of security by managing encryption keys in hardware security modules.&lt;/p&gt;

&lt;p&gt;Scenario: Your organization has strict regulatory requirements for encryption key management. Using CloudHSM, you generate and store encryption keys in a dedicated hardware security module, ensuring compliance with regulatory standards.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Secrets Management&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Secrets management involves securely storing, managing, and retrieving sensitive information such as passwords, API keys, and other credentials. AWS Secrets Manager helps you do this effectively.&lt;/p&gt;

&lt;p&gt;Scenario: You have a web application that requires access to a database. Instead of hardcoding the database credentials in your application code, you store them in AWS Secrets Manager. Your application retrieves these credentials securely at runtime, reducing the risk of exposing sensitive information.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>EXPLORING APPLICATION SECURITY SERVICES ON AWS</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Sun, 21 Apr 2024 08:43:43 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/exploring-application-security-services-on-aws-8b2</link>
      <guid>https://dev.to/warrisoladipup2/exploring-application-security-services-on-aws-8b2</guid>
      <description>&lt;p&gt;One of the services is &lt;strong&gt;WAF(WEB APPLICATION FIREWALLS)&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;&lt;u&gt;Firewall Basics:&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Purpose:&lt;/strong&gt; Prevent unauthorized access to networks by inspecting incoming and outgoing traffic against defined security rules.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Web Application Firewall (WAF):&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Purpose:&lt;/strong&gt; Protect web applications against common web attacks.&lt;br&gt;
&lt;strong&gt;Key Protections:&lt;/strong&gt; Defense against SQL injection and cross-site scripting (XSS).&lt;br&gt;
&lt;strong&gt;Real-World Application:&lt;/strong&gt; Deployed on EC2 instances or CloudFront to block XSS attacks directly.&lt;/p&gt;

&lt;p&gt;Another services is &lt;strong&gt;DDOS(DISTRIBUTED DENIAL OF SERVICES)&lt;/strong&gt;&lt;br&gt;
a DDOS attack causes a  traffic jam on a website or web application in an attempt to cause it to crash&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Distributed Denial of Service (DDOS) Protection:&lt;br&gt;
&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Service:&lt;/strong&gt; AWS Shield.&lt;br&gt;
&lt;strong&gt;Features:&lt;/strong&gt; Always-on detection for DDOS attacks.&lt;br&gt;
&lt;strong&gt;Types:&lt;/strong&gt; Shield Standard (free) and Shield Advanced (paid).&lt;br&gt;
&lt;strong&gt;Supported Services:&lt;/strong&gt; CloudFront, Route 53, ELB, AWS Global Accelerator.&lt;br&gt;
&lt;strong&gt;Real-World Application:&lt;/strong&gt; Real-time notifications and assistance during DDOS attacks.&lt;/p&gt;

&lt;p&gt;We also have &lt;strong&gt;MACIE&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;MACIE (Data Discovery and Protection):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Purpose:&lt;/strong&gt; Discover and protect sensitive data using machine learning.&lt;br&gt;
&lt;strong&gt;Key Features:&lt;/strong&gt; Evaluates S3 environments and uncovers personally identifiable information (PII).&lt;br&gt;
&lt;strong&gt;Real-World Application:&lt;/strong&gt; Identifying and securing sensitive data like passport numbers stored on S3.&lt;/p&gt;

&lt;p&gt;Each of these services plays a crucial role in securing different aspects of web applications and infrastructure. Firewalls like WAF protect against specific attacks, DDOS protection services like AWS Shield defend against large-scale attacks, and data discovery tools like MACIE help identify and protect sensitive information within cloud environments. These tools are vital components in maintaining the security and integrity of online applications and data.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Importance of Managing Access to your AWS services and resources.</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Fri, 12 Apr 2024 17:07:22 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/importance-of-managing-access-to-your-aws-services-and-resources-28i4</link>
      <guid>https://dev.to/warrisoladipup2/importance-of-managing-access-to-your-aws-services-and-resources-28i4</guid>
      <description>&lt;p&gt;First let discuss about IAM(identity access management )&lt;br&gt;
IAM add security to the your resources by allowing you to control who can access your aws services and what resources they can access.&lt;br&gt;
IAM plays a crucial role in enhancing the security of your cloud resources.&lt;br&gt;
You define who has&lt;br&gt;
access.&lt;br&gt;
You define what they can do.&lt;/p&gt;



&lt;p&gt;Secondly let talk about identity and access&lt;br&gt;
identities and access within AWS IAM, focusing on who can access your resources and what resources they can access, comparing the different types of entities involved:&lt;/p&gt;

&lt;p&gt;Identities:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Root User:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The root user is the initial account owner created when signing up for AWS services.&lt;br&gt;
This user has full administrative access to all resources in the AWS account.&lt;br&gt;
It is recommended to avoid using the root user for routine tasks to minimize security risks.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Individual Users:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These are AWS accounts created under your AWS organization.&lt;br&gt;
Each individual user has a unique set of credentials (username and password) or can authenticate via federated login (such as through Active Directory).&lt;br&gt;
You can grant specific permissions to individual users based on their roles or responsibilities within your organization.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Groups:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Groups are collections of individual users who have similar roles or permissions requirements.&lt;br&gt;
Instead of assigning permissions to each user individually, you can assign permissions to groups.&lt;br&gt;
This simplifies management by allowing you to add or remove users from groups to automatically adjust their permissions.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Roles:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Roles are used to delegate access to AWS services or resources to entities within or outside your AWS account.&lt;br&gt;
They are not associated with a specific user or group but are assumed by users, applications, or AWS services as needed.&lt;br&gt;
Roles are often used for cross-account access, allowing different AWS accounts to interact with resources in a controlled manner.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Access:&lt;/u&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Who Can Access Your Resources:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;IAM allows you to control access based on identities (root user, individual users, groups, or roles) and define specific permissions for each identity.&lt;br&gt;
By assigning permissions to identities, you determine who can perform actions on AWS resources.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What Resources They Can Access:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Permissions in IAM are defined using policies that specify actions (e.g., ec2:StartInstances) and resources (e.g., arn:aws:ec2:us-east-1:123456789012:instance/i-1234567890abcdef0) that can be accessed.&lt;br&gt;
Policies can be attached directly to individual users, groups, or roles to grant or restrict access to specific resources or services.&lt;/p&gt;

&lt;p&gt;Comparison:&lt;br&gt;
Root User: Has full administrative access to all resources by default. Should be used only for initial setup and emergency situations.&lt;/p&gt;

&lt;p&gt;Individual Users: Represent specific users within your AWS account, each with unique credentials and assigned permissions based on their roles or responsibilities.&lt;/p&gt;

&lt;p&gt;Groups: Used to manage permissions collectively for a set of users who share similar access requirements. Permissions are assigned to groups, and users inherit these permissions by being members of the group.&lt;/p&gt;

&lt;p&gt;Roles: Provide temporary access to AWS resources for users, applications, or services without the need to share long-term credentials. Roles are assumed by entities, allowing them to perform actions based on the assigned permissions.&lt;/p&gt;

&lt;p&gt;thirdly, let talk about authentication and authorization.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Authentication:&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;Authentication is the process of verifying the identity of a user, application, or entity attempting to access a system or resource. In AWS IAM:&lt;/p&gt;

&lt;p&gt;What it is: Authentication involves presenting your identity (e.g., username, AWS access key ID) and providing verification (e.g., password, AWS secret access key) to prove that you are who you claim to be.&lt;br&gt;
Purpose: The goal of authentication is to ensure that the entity requesting access is a legitimate user or system with the proper credentials.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Authorization:&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;Authorization is the process of determining what actions and resources an authenticated identity is allowed to access within a system or service. In AWS IAM:&lt;/p&gt;

&lt;p&gt;What it is: Authorization determines which AWS services and resources an authenticated identity (user, application, role) can interact with based on their assigned permissions.&lt;br&gt;
Purpose: The purpose of authorization is to enforce security policies that control access to specific actions (e.g., read, write) on designated resources (e.g., S3 buckets, DynamoDB tables) within the AWS environment.&lt;br&gt;
Key Points:&lt;br&gt;
Authentication: Verifies the identity of users or systems trying to access AWS resources by presenting credentials (e.g., username/password, access keys).&lt;/p&gt;

&lt;p&gt;Authorization: Controls what actions (e.g., read, write, delete) an authenticated identity can perform on specific AWS resources (e.g., S3 objects, DynamoDB tables) based on assigned permissions. &lt;/p&gt;

&lt;p&gt;Example in AWS IAM:&lt;br&gt;
In an IAM policy:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "s3:GetObject",
        "dynamodb:Scan"
      ],
      "Resource": [
        "arn:aws:s3:::example-bucket/*",
        "arn:aws:dynamodb:us-east-1:123456789012:table/MyTable"
      ]
    }
  ]
}

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Authentication: Before applying this policy, a user must authenticate (e.g., provide their IAM user credentials).&lt;/p&gt;

&lt;p&gt;Authorization: If the authentication is successful, AWS then evaluates the policy to determine whether the authenticated user is authorized to perform s3:GetObject on objects within the example-bucket and dynamodb:Scan operations on the MyTable DynamoDB table.&lt;/p&gt;

&lt;p&gt;please stay tune for the next lesson&lt;br&gt;
thank you &lt;/p&gt;

</description>
    </item>
    <item>
      <title>how to create an iam user using terraform</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Wed, 28 Jun 2023 09:03:14 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/how-to-create-an-iam-user-using-terraform-1j54</link>
      <guid>https://dev.to/warrisoladipup2/how-to-create-an-iam-user-using-terraform-1j54</guid>
      <description>&lt;p&gt;hello! click on the link below and watch the full video &lt;a href="https://youtu.be/mO43fdMwvHw" rel="noopener noreferrer"&gt;https://youtu.be/mO43fdMwvHw&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Creating internet gateway and public subnet and we will attach it to the VPC</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Mon, 06 Mar 2023 13:24:15 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/creating-internet-gateway-and-public-subnet-and-we-will-attach-it-to-the-vpc-3kg</link>
      <guid>https://dev.to/warrisoladipup2/creating-internet-gateway-and-public-subnet-and-we-will-attach-it-to-the-vpc-3kg</guid>
      <description>&lt;p&gt;Before we can attach the internet gateway and public subnet  to the VPC ,  we need to create the VPC(VIRTUAL PRIVATE CLOUD ) modules.&lt;/p&gt;

&lt;p&gt;Here is an example of a vpc modules,&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqzfkckb8mhsqrtpiv1tx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqzfkckb8mhsqrtpiv1tx.png" alt="Image description" width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;this particular module will creates a Virtual Private Cloud (VPC) resource in AWS. The  "vpc_cidr_block" is the IP address range that the VPC will use, and "vpc_name" is a name that will be assigned to the VPC as a tag.  The "aws_vpc" resource block is where the VPC will  actually be created. &lt;/p&gt;

&lt;p&gt;next we need to create an internet gateway modules and here is an examples of an internet gateway modules,&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbl5yy36wfepw0epk3k3e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbl5yy36wfepw0epk3k3e.png" alt="Image description" width="800" height="409"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This Terraform module creates an Internet Gateway  resource in AWS. In this module, the aws_internet_gateway resource is created, and it is associated with a VPC specified by the vpc_id attribute. &lt;br&gt;
Remember internet gateway allow communication between instances in your VPC and the internet, so to associate your internet gateway to your vpc , you always need the vpc_id in your internet gateway modules. Overall, this module creates an Internet Gateway  resource and associates it with a VPC, which is necessary for enabling internet access to resources in the VPC. &lt;/p&gt;

&lt;p&gt;Next we need to create a public subnet, we can also have a private   subnet which will be my next post with route tables but we are creating public subnet in this lecture and here is an example&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuor45nils8lvxfp3g9xy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuor45nils8lvxfp3g9xy.png" alt="Image description" width="800" height="458"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before explanation, what is subnet? A subnet, short for "subnetwork," is a portion of a larger network that has been divided into smaller, more manageable sections.  In this case, the subnet is created in a public VPC, which means that it has access to the internet via  an internet gateway. &lt;/p&gt;

&lt;p&gt;The aws_subnet resource is used to create the subnet. It requires the VPC ID (which is specified in a separate resource called aws_vpc.main), the CIDR block (which is specified in a variable called var.public_subnet_cidr_block), and the availability zone (which is specified in a variable called var.availability_zones[0]).  The tags block is used to assign a name to the subnet for easier identification.&lt;/p&gt;

&lt;p&gt;Overall, this module is a simple way to create a public subnet in an AWS VPC, which can be useful for hosting public-facing resources like web servers or load balancers.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Deploying VPC after creating your EC2 instances</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Sat, 04 Mar 2023 20:08:12 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/deploying-vpc-after-creating-your-ec2-instances-gg3</link>
      <guid>https://dev.to/warrisoladipup2/deploying-vpc-after-creating-your-ec2-instances-gg3</guid>
      <description>&lt;p&gt;After creating your ec2 instance which was my last post, we need to deploy VPC and in this course we are talking about aws vpc, and you can copy vpc resources on terraform website.  To create your VPC, &lt;/p&gt;

&lt;p&gt;We need to create a new new .tf file which I named main.tf,  this file will contain your VPC resources &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxxgbhqqlgxvetd8x5ca9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxxgbhqqlgxvetd8x5ca9.png" alt="Image description" width="800" height="430"&gt;&lt;/a&gt; &lt;br&gt;
NOTE : all file created will work as one file.&lt;/p&gt;

&lt;p&gt;after you've provided your resources , you need to apply the resources by typing terraform plan on your VScode terminal.&lt;/p&gt;

&lt;p&gt;after that, you need the apply phase by typing terraform apply on your terminal. &lt;/p&gt;

&lt;p&gt;your VScode will ask for confirmation to apply , type yes to confirmed and your VPC is created .&lt;/p&gt;

&lt;p&gt;my next post will be creating internet gateways  because we are going to be building developers environment together;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How to lunch AWS EC2 instance using Terraform</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Sun, 19 Feb 2023 16:16:21 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/how-to-lunch-aws-ec2-instance-using-terraform-gd9</link>
      <guid>https://dev.to/warrisoladipup2/how-to-lunch-aws-ec2-instance-using-terraform-gd9</guid>
      <description>&lt;p&gt;step 1 : install terraform on your machine or computer &lt;br&gt;
step 2 : check the version of your terrform from either the command prompt or your VScode terminal;&lt;br&gt;
step 3: set up your region, aws access key and secret access key from your aws &lt;br&gt;
step 4: after you've done that , the first thing you need for your terraform is a provider( which is aws in this course) there are many providers but we are choosing AWS.   on your Vscode , create a provider.tf file.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvjhqtfepjgkciss2fyjn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvjhqtfepjgkciss2fyjn.png" alt=" " width="800" height="428"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 5: provide the access keys and secret keys in your provider.tf file.&lt;/p&gt;

&lt;p&gt;step 6: then initialize your terraform by typing "terraform init" in your VScode terminal&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcqyhlsxbnxu3zn8n1tih.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcqyhlsxbnxu3zn8n1tih.png" alt=" " width="800" height="427"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 7: to check if your terraform is valid type "terraform validate"&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuyw71z49c0nb4cnwvbbd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuyw71z49c0nb4cnwvbbd.png" alt=" " width="800" height="426"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 8:now creating an EC2 instance, you need to create an EC2.tf file on your VScode.&lt;/p&gt;

&lt;p&gt;step 9: put your resources inside the EC2.tf file &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhxxwv2698tnfi3gjvfd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhxxwv2698tnfi3gjvfd.png" alt=" " width="800" height="427"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 10: provide the ami and the region you are using from AWS&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcy4frl7xt5252hqx5mg5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcy4frl7xt5252hqx5mg5.png" alt=" " width="800" height="336"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe34868k4nkzw2601ywkm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe34868k4nkzw2601ywkm.png" alt=" " width="800" height="335"&gt;&lt;/a&gt;&lt;br&gt;
the first picture is to show the ami i am using while the second is to show the region i am using.&lt;/p&gt;

&lt;p&gt;step 11: after that , the next thing is to plan by typing "terraform plan" in your VScode terminal.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv5h46iorazzmarbe6s2t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv5h46iorazzmarbe6s2t.png" alt=" " width="800" height="429"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 12: to activate the plan and get terraform running , type "terraform apply" and your aws will start creating.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3f6y0cmke58bp6q0c7sm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3f6y0cmke58bp6q0c7sm.png" alt=" " width="800" height="428"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 13: then go back to your AWS and check the instance state if it's running&lt;/p&gt;

</description>
      <category>vibecoding</category>
    </item>
    <item>
      <title>LAMBDA</title>
      <dc:creator>warris oladipupo</dc:creator>
      <pubDate>Sat, 21 Jan 2023 19:21:03 +0000</pubDate>
      <link>https://dev.to/warrisoladipup2/lambda-35n5</link>
      <guid>https://dev.to/warrisoladipup2/lambda-35n5</guid>
      <description>&lt;p&gt;&lt;strong&gt;Lambda&lt;/strong&gt; is a serverless compute service which can help you to run a code without managing servers.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The code you run on lambda is called **Functions&lt;/em&gt;**&lt;br&gt;
*Lambda scale automatically.&lt;br&gt;
*Lambda is serverless which means you don't have to worry about&lt;br&gt;
managing servers like EC2.&lt;/p&gt;

&lt;p&gt;In a bigger picture,&lt;br&gt;
*Lambda allow developers to focus on core business logic for the app they are developing instead of worrying about managing servers.&lt;/p&gt;

&lt;p&gt;*Lambda is a building block for many serversless applications.&lt;/p&gt;

&lt;p&gt;In lambda, serverless simply means AWS manages the servers for you and you cannot access them.&lt;/p&gt;

&lt;p&gt;In the real world, lambda is used for&lt;/p&gt;

&lt;p&gt;*Real-time file processing&lt;br&gt;
*Sending email notifications&lt;br&gt;
*Backend business logic.&lt;/p&gt;

&lt;p&gt;Features of lambda.&lt;/p&gt;

&lt;p&gt;*It support popular programming languages like java,node.js, python and ruby. &lt;br&gt;
*Lambda can execute your code in response to events. &lt;br&gt;
*You author code using your favorite development environment or via the console.&lt;/p&gt;

</description>
      <category>productivity</category>
    </item>
  </channel>
</rss>
