Maxat Akbanovmaxat-akbanov.com·Jan 13, 2025Permissions Boundary Policy in AWSAWS Permissions Boundaries is an advanced feature for using a managed policy that allow you to define the maximum permissions a user or role can have. This ensures that even if an administrator grants excessive permissions (through policies or groups...28 readsawsAWS
Maxat Akbanovmaxat-akbanov.com·Dec 4, 2024Understanding AWS IAM Trust Policies: How They Differ from Permission Policies and Work TogetherA trust policy in AWS IAM (Identity and Access Management) is a JSON document associated with an IAM role that defines who or what (the principal) can assume the role. Image credits: Unubold Tumenbayar It acts as a security mechanism to specify the ...34 readsawsAWS
Abishek Kafledevops.abisec.xyz·Oct 8, 2024Attach IAM Policy to IAM UserTasks An IAM user named iamuser_mariyam and a policy named iampolicy_mariyam already exist. Attach the IAM policy iampolicy_mariyam to the IAM user iamuser_mariyam. Steps IAM useriamuser_mariyam is already exists. IAM → Policies IAM →Users →...Cloud PlatformsIAM
Khoa Nguyenkhoafrancisco.hashnode.dev·Sep 5, 2024Thao tác với IAM User, Group, PolicyMột sô khái niệm cơ bản của IAM, Roles, user groups, S3 Bucket bạn có thể đọc qua để hiểu khái niệm về chúng. Nội dung bài lab thực hành với IAM User, Group, Policy Tạo group developer-group có quyền AdministratorAccess (managed policy). Create 1 us...33 readsAWS
Nettribe Medianettribe.hashnode.dev·Aug 17, 2024Apple Now Lets Spotify Show Pricing Details to iOS Users in EUIn a groundbreaking move, Apple has finally allowed Spotify to display pricing information directly to users in the European Union (EU) on iOS devices! This exciting decision comes after years of tension between the two companies, mainly over Apple’s...Spotify
ajay singhlearwithme.hashnode.dev·Aug 3, 2024How to use IAM user In AWS to access EC2 and S3 bucket via CLIBrief description about the IAM. AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. It allows you to manage permissions and policies to determine who is authenticated (signed in) and aut...114 readsAWS
Ashwini Kumarblogs.reactivedroid.com·Jul 30, 2024Hard-earned Learnings From Navigating Google Play App RejectionsIntroduction Whether you’re an Android developer or a release manager, encountering app rejection is a familiar challenge. You may have found yourself pondering the intricacies of Google Play’s review process: How exactly are apps evaluated? Is it a ...145 readsapp rejection
Siyal cloudwisdomwithsiyal.hashnode.dev·Jul 21, 2024Mini Project :- Google Cloud Platform StorageIn this mini project, I explored the storage services provided by Google Cloud Platform (GCP). Below are the steps I followed to create a bucket, upload an image, and make it publicly accessible :- 1. Creating a Bucket:- Log into your GCP account and...Google
Reza Rashidirezaduty-1685945445294.hashnode.dev·Jul 15, 2024Attacking PolicyOpen Policy Agent (OPA) is a versatile tool used to enforce policies and ensure compliance within a DevSecOps environment. However, security misconfigurations in OPA can lead to significant vulnerabilities. One common issue is overly permissive polic...1 like·280 readsPolicy
Yashraj Singh Sisodiyatheyashsisodiya.hashnode.dev·Mar 12, 2024Day 38: Getting Started with AWS Basics☁Getting Started with AWS: A Beginner's Guide to IAM and EC2 Introduction Amazon Web Services (AWS) is a leading cloud provider offering a range of services for building, deploying, and managing applications in the cloud. In this beginner-friendly gui...AWS