<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Yogita Sharma</title>
    <description>The latest articles on DEV Community by Yogita Sharma (@yogita).</description>
    <link>https://dev.to/yogita</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F979737%2Fa3de4b94-8e47-48da-80f8-0cbc55344d01.jpg</url>
      <title>DEV Community: Yogita Sharma</title>
      <link>https://dev.to/yogita</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/yogita"/>
    <language>en</language>
    <item>
      <title>Understanding IAM</title>
      <dc:creator>Yogita Sharma</dc:creator>
      <pubDate>Mon, 16 Jan 2023 13:41:36 +0000</pubDate>
      <link>https://dev.to/yogita/understanding-iam-3ldc</link>
      <guid>https://dev.to/yogita/understanding-iam-3ldc</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is IAM:&lt;/strong&gt;&lt;br&gt;
IAM is a web service that enables you to securely manage and access AWS services. It helps you to control who is authenticated and authorized to use the services. It is integrated well with every other AWS service.&lt;/p&gt;

&lt;p&gt;IAM service usage is FREE!&lt;/p&gt;

&lt;p&gt;Let us take an example of an organization that has different departments such as the software department, legal department, finance department, travel, etc. Each department has persons working for them with specific duties or roles. For example, the software development department will have software professionals, the legal department will have lawyers and the finance department will have finance-related experts, etc.&lt;br&gt;
In this organization software professionals will have access to codebases and servers but are unlikely to access legal documents and financial documents. &lt;br&gt;
Integrated access management(IAM) is done by creating a specific role i.e. certain type of access is given to the individuals who have a certain role.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---dZGCE1k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oinw4a6aoooexnjdqgli.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---dZGCE1k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oinw4a6aoooexnjdqgli.png" alt="Image description" width="880" height="412"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Features of IAM:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IAM helps to securely manage AWS services and resources.&lt;/li&gt;
&lt;li&gt;It allows us to create principals such as users, groups, and roles to have secure access to the resources.&lt;/li&gt;
&lt;li&gt;IAM allows us to define policies in which we allow /deny access to the resources.&lt;/li&gt;
&lt;li&gt;It supports identity federation for dedicated access to the AWS management console of AWS APIs.&lt;/li&gt;
&lt;li&gt;It provides multi-factor authentication.&lt;/li&gt;
&lt;li&gt;It provides a policy simulator.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;IAM Identities:&lt;/strong&gt;&lt;br&gt;
An IAM Identity provides access to an AWS account, represents a user, and can be authenticated to perform actions in AWS. Policies determine what actions a user, role, or member of a user group can perform on which AWS resources and under what conditions.&lt;br&gt;
A user group is similar to a user, it is an identity with permission policies that determine what the identity can and cannot do in AWS, but a role does not have any credentials(password or access keys) associated with it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IAM Users:&lt;/strong&gt;&lt;br&gt;
An IAM user is an entity that you create in AWS and represents the person or service that interacts with AWS. The main purpose for IAM users is to give people the ability to sign in to the AWS Management Console for interactive tasks and to make programmatic requests to AWS services using the API or CLI.&lt;br&gt;
A user consists of a name, a password to sign into the AWS Management Console, and up to two access keys that can be used with the API or CLI.&lt;br&gt;
When created, an IAM user is granted permission through membership in a user group that has appropriate permission policies attached(recommended) or by directly attaching policies to the user.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IAM Groups:&lt;/strong&gt;&lt;br&gt;
A group is a collection of users, user groups specify permissions for a collection of users, making those permissions easier to manage for the users.&lt;br&gt;
A user group cannot be identified as a Principal, a person, or an application that can request an action or operation on an AWS resource in a resource-based p&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>aws</category>
      <category>iam</category>
      <category>security</category>
    </item>
    <item>
      <title>Amazon Security: WAF and Shield</title>
      <dc:creator>Yogita Sharma</dc:creator>
      <pubDate>Mon, 16 Jan 2023 12:42:51 +0000</pubDate>
      <link>https://dev.to/yogita/amazon-security-waf-and-shield-5dm4</link>
      <guid>https://dev.to/yogita/amazon-security-waf-and-shield-5dm4</guid>
      <description>&lt;h2&gt;
  
  
  Web application Firewall
&lt;/h2&gt;

&lt;p&gt;Web Application Firewall is a security service provided by AWS that helps protect your Web Application from common web exploits that could affect application availability, compromising security, or consume excessive resources.&lt;br&gt;
It is used to monitor the HTTP and HTTPS requests that are forwarded to an Amazon API, Gateway API, Amazon CloudFront, or an Application Load Balancer.&lt;br&gt;
It also gives control over which traffic to allow or block to your web applications by defining customizable web security rules.&lt;br&gt;
Any public web applications are exposed to certain common exploits, using a web application firewall; you can watch for vulnerabilities and block them upfront without affecting your applications running on these AWS services.&lt;br&gt;
When we enable the Web Application Firewall, it watches for the following character streaks in a web request.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwe0io4fchi01mctz73sl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwe0io4fchi01mctz73sl.png" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cross Site Scripting (XSS):&lt;/strong&gt;&lt;br&gt;
These are scripts that are likely to be malicious. Attackers embed these scripts that can exploit vulnerabilities in your web applications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IP addresses range that requests originate from:&lt;/strong&gt;&lt;br&gt;
WAF can look for countries or geographical locations where requests originate from.&lt;br&gt;
Length of a specific part of the request such as the query string.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It can find the SQL Injection:&lt;/strong&gt;&lt;br&gt;
SQL Injections are SQL code that is likely to be malicious. So that attackers can try to extract data from your database by embedding malicious SQL code in a web request.&lt;br&gt;
It can also look for strings that appear in the request, for example, values that appear in the query string.&lt;/p&gt;

&lt;p&gt;When we are setting up WAF for different AWS services first we define the conditions for example if a request is originating from a particular country.&lt;br&gt;
After defining the conditions we combine them into rules. A rule contains multiple conditions. The rules are then combined into Web ACL. This is where we define an action for each rule. We can also define a default action that gets executed when none of the rules are met.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr1oqojfbt7g3m2fdtrx1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr1oqojfbt7g3m2fdtrx1.png" alt="Image description" width="200" height="190"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  AWS Shield:
&lt;/h2&gt;

&lt;p&gt;AWS Shield protects against DDoS attacks. The DDoS attack is a distributed denial of service (DDoS) attack. It is an attack in which multiple compromised systems attempt to flood a target, such as a network or a web application, with traffic. A DDoS attack can prevent legitimate users from accessing a service and can cause the system to crash due to the overwhelming traffic volume.&lt;/p&gt;

&lt;p&gt;AWS provides two types of Shields:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS Shield Standard:&lt;/strong&gt; &lt;br&gt;
Shield network and transport layer DDoS attacks that target your website or applications. All AWS customers are benefited from the automatic protections of AWS Shield Standard at no additional charges.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS Shield Advanced:&lt;/strong&gt;&lt;br&gt;
It provides expanded DDoS attack protection for web applications running on Amazon EC2, Elastic Load Balancing (ELB), CloudFront, and Route 53 resources. It comes with an additional charge.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Amazon Cognito</title>
      <dc:creator>Yogita Sharma</dc:creator>
      <pubDate>Mon, 16 Jan 2023 12:20:24 +0000</pubDate>
      <link>https://dev.to/yogita/amazon-cognito-2n8l</link>
      <guid>https://dev.to/yogita/amazon-cognito-2n8l</guid>
      <description>&lt;p&gt;&lt;strong&gt;Understanding Amazon Cognito:&lt;/strong&gt;&lt;br&gt;
Cognito provides authentication, authorization, and user management for web and mobile apps. Users can sign in directly with their user name and passwords and can also use a third party such as Facebook, Amazon, Google, or apple to authenticate. There are a few main components of Cognito given:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;User Pools:These are user directories that enable signup and sign-in options for app users.&lt;/li&gt;
&lt;li&gt;Identity pools: It is used to grant users access to other AWS services. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We can use identity and user pools separately or together. We can also synchronize data across devices(Cognito Sync)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;User Pools:&lt;/strong&gt; &lt;br&gt;
It is a user directory in Cognito.&lt;br&gt;
Users can sign in to the web or mobile app through Cognito or federate through a third-party identity provider(IdP)&lt;br&gt;
All members of the user profile have a directory profile accessible through SDK.&lt;/p&gt;

&lt;p&gt;User pool capabilities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sign up and sign in services&lt;/li&gt;
&lt;li&gt;Built-in web interface to sign in users &lt;/li&gt;
&lt;li&gt;Sign in with Facebook, Google, Amazon, and Apple, and through SAML/OIDC identity protocol-based providers from user pools.&lt;/li&gt;
&lt;li&gt;Manage user directories and user profiles.&lt;/li&gt;
&lt;li&gt;Use lambda triggers to customize workflows and user migration.&lt;/li&gt;
&lt;li&gt;Multi-factor authentication, checks for compromised credentials, account takeover protection, and phone and email verification.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqnznexa7s3nn1w68po8p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqnznexa7s3nn1w68po8p.png" alt="Image description" width="606" height="110"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cognito Identity Pools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identity pools are used to obtain temporary credentials to access AWS services.&lt;/li&gt;
&lt;li&gt;Supports anonymous guest and identity providers that can be used to authenticate users for identity pools.
Cognito user pools&lt;/li&gt;
&lt;li&gt;Sign in with Facebook, Google, Amazon, and Apple, and through SAML/OIDC identity protocol-based providers from the user pool.
Developer authenticated identities.&lt;/li&gt;
&lt;li&gt;To save user profile information, an identity pool needs to be integrated with a user pool.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Cognito Sync:&lt;/strong&gt;&lt;br&gt;
It is a service and client library that provides cross-device syncing of application usage data.&lt;br&gt;
We can synchronize user profile data across mobile devices and web apps without a custom backend.&lt;br&gt;
client libraries cache data locally allowing the app to read and write data even with device connectivity variability.&lt;br&gt;
With the device online, synchronize data, if push sync is enabled, notify other devices immediately that an update is available.&lt;/p&gt;

</description>
      <category>career</category>
      <category>workplace</category>
      <category>employeeexperience</category>
      <category>productivity</category>
    </item>
    <item>
      <title>S3 Fundamentals</title>
      <dc:creator>Yogita Sharma</dc:creator>
      <pubDate>Mon, 16 Jan 2023 10:04:45 +0000</pubDate>
      <link>https://dev.to/yogita/s3-fundamentals-219n</link>
      <guid>https://dev.to/yogita/s3-fundamentals-219n</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is S3?&lt;/strong&gt;&lt;br&gt;
Storage for the internet designed to make web-scale computing easier, simple web services interface used to store and retrieve any amount of data at any time and from anywhere on the web.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key benefits of S3:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Creating buckets:&lt;/strong&gt; &lt;br&gt;
Create and name a bucket that stores data. Buckets are the fundamental containers in S3 for data storage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Storing data:&lt;/strong&gt;&lt;br&gt;
Store an infinite amount of data in a bucket, upload unlimited objects into an S3 bucket where each object can contain up to 5TB of data and each object is stored and retrieved using a unique developer assigned key.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Downloading data:&lt;/strong&gt;&lt;br&gt;
Download your data anytime you like or enable others to do the same through bucket policies and other security mechanisms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Permissions:&lt;/strong&gt; &lt;br&gt;
Grant or deny access to others who want to upload or download data into you S3 bucket, authenticate mechanisms keep data secure from unauthorized access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Standard Interface:&lt;/strong&gt; &lt;br&gt;
Use standard based REST and SOAP interfaces.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DWlDtwcI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wm8236n4vz40gd5va9lq.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DWlDtwcI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wm8236n4vz40gd5va9lq.jpg" alt="Image description" width="247" height="204"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Key terminologies of S3:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Buckets:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Containers for objects stored in S3.&lt;br&gt;
Every object must be contained in a bucket.&lt;/p&gt;

&lt;p&gt;Purpose of S3 buckets:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Organize the S3 namespace at the highest level.&lt;/li&gt;
&lt;li&gt;Identity responsible account for storage and data transfer charges.&lt;/li&gt;
&lt;li&gt;Play a role in access control.&lt;/li&gt;
&lt;li&gt;Serve as the unit of aggregation for usage reporting.&lt;/li&gt;
&lt;li&gt;Configure buckets so that they are created in a specific region&lt;/li&gt;
&lt;li&gt;Can configure a bucket so that every time an object is added to it, S3 generates a unique version ID and assigns that id to the object.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Objects:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fundamental entitles stored in S3&lt;/li&gt;
&lt;li&gt;They can be pdf files, text files, mp3 files, spreadsheets, or any kind of files.&lt;/li&gt;
&lt;li&gt;They consists of object data and metadata where the object data is not visible to S3&lt;/li&gt;
&lt;li&gt;Metadata is a set of name-value pairs that describe the object.&lt;/li&gt;
&lt;li&gt;Metadata includes some default metadata such as the data last modified and standard HTTP metadata such as a content type. At the time the object is stored can also specify custom metadata.
Object is uniquely identified within a bucket by a key and a version ID.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Keys:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Unique identifier for an object within a bucket, every object has exactly one key.&lt;/li&gt;
&lt;li&gt;Combination of a bucket, key and version ID uniquely identify each object.&lt;/li&gt;
&lt;li&gt;Every object in S3 can be uniquely addressed through the combination of the web service endpoint, bucket name, key and optionally a version.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Regions:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We can choose the geographical region where S3 will store the buckets that you create.&lt;/li&gt;
&lt;li&gt;Choose a region to optimize latency, minimize cost, and/or address regulatory requirements.&lt;/li&gt;
&lt;li&gt;Objects stored in a region never leave the region unless explicitly transfer them to another region.&lt;/li&gt;
&lt;li&gt;You can only access S3 and its features in regions that are enabled for your accounts.&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>IAM Best Practices</title>
      <dc:creator>Yogita Sharma</dc:creator>
      <pubDate>Mon, 16 Jan 2023 09:37:44 +0000</pubDate>
      <link>https://dev.to/yogita/best-practices-for-using-iam-32jk</link>
      <guid>https://dev.to/yogita/best-practices-for-using-iam-32jk</guid>
      <description>&lt;p&gt;&lt;strong&gt;1. Always lock away your AWS Account Root User Access Key:&lt;/strong&gt;&lt;br&gt;
The access key for your AWS account gives full access to all your resources for all AWS services, including your billing information. Therefore, always protect your AWS account access key just like you would protect your credit card numbers or any other sensitive secret.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Create individual IAM Users:&lt;/strong&gt;&lt;br&gt;
As much as possible you must stay away from using your AWS account root user credentials to access AWS and never give your credentials to anyone else. Instead, always create individual users for anyone who needs access to your AWS account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Configure a strong password policy for your users:&lt;/strong&gt;&lt;br&gt;
If you allow users to change their passwords, require that they create strong passwords and that they rotate their passwords periodically. You can use the password policy to define password requirements such as minimum length, whether requires non-alphabetic characters, how frequently it must be rotated, and so on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Rotate credentials regularly:&lt;/strong&gt;&lt;br&gt;
Change your passwords and access keys regularly and make sure that all IAM users in your account do that as well. That way if a password or access key is compromised without your knowledge, you can limit how long the credentials can be used to access your resources.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Remove unnecessary credentials:&lt;/strong&gt;&lt;br&gt;
Remove IAM user credentials which are password and access keys, that are not needed. Similarly, if a user does not and will never use the access key, there is no reason for the user to have them. Passwords and access keys that have not been used recently might be good candidates for removal. You can find the unused&lt;br&gt;
passwords or access keys using the console, using the API, or by downloading the credentials report.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F22s92t5v4bss0tfjnb1z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F22s92t5v4bss0tfjnb1z.png" alt="Image description" width="800" height="485"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Enable MFA for privileged users:&lt;/strong&gt;&lt;br&gt;
For extra security enable multi-factor authentication, that is MFA for the privileged IAM users are users who are allowed access to sensitive or API operations. With MFA, users have a device that generates a unique authentication code, a one-time password, or an OTP. Users must provide both their normal credentials and the OTP. The MFA device can either be a special piece of hardware or it can be a virtual device. For example, it can run on an app or a smartphone.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. Users groups to assign permissions to IAM groups:&lt;/strong&gt;&lt;br&gt;
Instead of defining permissions for individual IAM users, it is usually more convenient to create groups that relate to job functions such as administrator or developers or accounting, etc. Next, define the relevant permissions for each group. Finally, assign IAM users to those groups. All the users in an IAM group inherit the permissions assigned to that group that way, you can make changes for everyone in a group in just one place. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;8. Use AWS-defined policies to assign permissions whenever possible:&lt;/strong&gt;&lt;br&gt;
AWS recommends that you use the managed policies that are created and maintained by AWS to grant permissions whenever possible. A key advantage of using these policies is that they are maintained and updated by AWS as new services, or new API operations are introduced. But also keep in mind that custom-managed policies are more flexible. Hence, you need to ensure that those policies are defined well and in a secure manner.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;9. Use policy conditions for extra security:&lt;/strong&gt;&lt;br&gt;
To the extent that it is practical, define the conditions under which your IAM policies allow access to a resource. For example, you can write conditions to specify a range of allowable IP addresses that a request must come from. You can also specify that a request is allowed only with a specified date range or time range.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;10. Grant least privilege:&lt;/strong&gt;&lt;br&gt;
When you create IAM policies, follow the standard security advice of granting the least privileges which are granting only the permissions required to perform a task. Determine what users need to do and then craft policies for them that let the users perform only those tasks. Always start with a minimum set of permissions and grant additional permissions as necessary, doing so is more secure than starting with permissions that are too lenient and then trying to tighten them later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;11. Use access levels to review IAM permissions:&lt;/strong&gt;&lt;br&gt;
When you review a policy, you can view the policy summary which includes a summary of the access level for each service action within that policy. AWS categorizes each service action into one of four access levels based on what each action does; that is it uses these access levels to determine which actions to include in your policies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;12. Use roles to delegate permissions:&lt;/strong&gt;&lt;br&gt;
Never share security credentials between accounts to allow users from another AWS account to access resources in your AWS account. Instead, always use IAM roles. You can define a role that specifies what permissions the IAM users in the other account are allowed. For example, applications that run on an EC2 instance need credentials to access other AWS services. To provide credentials to the application in a secure way, always use IAM roles.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;13. Monitor Activity in your AWS Account:&lt;/strong&gt;&lt;br&gt;
You can use logging features in AWS to determine the actions users have taken in your account and the resources that were used. The log files show the time and date of the actions, the source IP for an action, which actions failed due to inadequate permissions, and more logging features available in Amazon CloudFront, CloudTrail, CloudWatch, Config, and S3.&lt;/p&gt;

</description>
      <category>watercooler</category>
    </item>
    <item>
      <title>Features and Uses of S3(Simple Storage Service)</title>
      <dc:creator>Yogita Sharma</dc:creator>
      <pubDate>Sat, 14 Jan 2023 10:48:47 +0000</pubDate>
      <link>https://dev.to/yogita/features-and-uses-of-s3simple-storage-service-29bl</link>
      <guid>https://dev.to/yogita/features-and-uses-of-s3simple-storage-service-29bl</guid>
      <description>&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  Main features of S3
&lt;/h2&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Durability:&lt;/strong&gt; Amazon S3 is designed to deliver 99.99999999% durability of objects over a given year.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability:&lt;/strong&gt; The data in S3 is automatically distributed over a minimum of 3 physical availability zones. If one zone is unavailable, the data is still available in the other two zones by a replicated copy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scalability:&lt;/strong&gt; S3 is managed by AWS and automatically scales up and down depending on the load.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reliability:&lt;/strong&gt; It is an extremely reliable service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fast:&lt;/strong&gt; The multipart upload option enables you to upload large objects in parts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Inexpensive:&lt;/strong&gt; It is the most cost-efficient data storage and archived service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Secure:&lt;/strong&gt; Server-side encryption and Client-side encryption offers sophisticated integration with AWS CloudTrait to log,&lt;br&gt;
monitor and retain storage API call activities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Flexible Storage Management:&lt;/strong&gt; Storage Administrators can classify reports and visualize the data usage trends to reduce cost and improve service levels.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Easy Interface for Data Transfer:&lt;/strong&gt; It have a simple interface to download and retrieve data anytime and from anywhere on the web.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Easy Integration:&lt;/strong&gt; It consists of thousands of consulting system integrators and is supported by an independent software vendorn partners.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdby7myiue3p8k3m6o2j5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdby7myiue3p8k3m6o2j5.jpg" alt="Image description" width="550" height="412"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Uses of S3:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Backup and Recovery:&lt;/strong&gt; Versioning-enabled buckets enable you to recover objects from accidental deletion or overwrite.&lt;br&gt;
Amazon S3 offers a highly durable, scalable, and secure destination for backing up and archiving your critical data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Archiving:&lt;/strong&gt; Amazon S3 and Amazon Glacier provide a range of storage classes to meet the needs of compliance archives&lt;br&gt;
for regulated industries or archives for regulated industries or active archive for the organization that need fast infrequent&lt;br&gt;
access to archived data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Lake for Big Data Analytics:&lt;/strong&gt; Amazon S3 can be used as your data lake for big data analytics. It helps you manage big data by reducing costs while simultaneously scaling to meet the high demands.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hybrid Cloud Storage:&lt;/strong&gt; It helps you build hybrid cloud storage augmenting your existing load storage environment with the &lt;br&gt;
durability and scale of Amazon S3.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud-Native Application Data:&lt;/strong&gt; S3 provides high-performance, highly available storage that makes it easy to scale and maintain&lt;br&gt;
cost-effective mobile and Internet-based apps that run very fast. With S3 you can add any amount of content and access it from anywhere. So you can deploy applications faster and reach customers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Disaster Recovery:&lt;/strong&gt; S3's highly durable, secure, global infrastructure offers a robust disaster recovery solution designed to provide superior data protection.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbyhknztz9jr5qna84rci.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbyhknztz9jr5qna84rci.png" alt="Image description" width="270" height="186"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>welcome</category>
      <category>community</category>
    </item>
  </channel>
</rss>
