Posts

Showing posts with the label iam

Guide to using AWS Tokens effectively

Image
Introduction Current issues In previous articles, I have provided instructions on using AWS access tokens and secret tokens to utilize Amazon services, but there is an issue where these tokens do not have an expiration time. Thus, if your tokens are somehow leaked, an attacker can use them for as long as they want until you can detect and delete these tokens. This is a user-side issue, but there are still ways to limit the impact of this by granting temporary tokens during use. Naturally, these temporary tokens will have a short lifespan (about a few hours, or you can change the duration to suit your security level). Therefore, even if this token is leaked, an attacker only has a limited amount of time to use it before the token expires. If you are a member created by IAM Identity Center, you are already supported with permission management and integrated security measures during use. However, if you are using a personal account or have the rights to create an IAM User, there are still...

AWS Practice Series

Image
Introduction AWS (Amazon Web Services) is the world’s most comprehensive and broadly adopted cloud platform. It offers over 200 fully featured services from data centers globally. Instead of building and maintaining your own physical servers, you can simply "rent" resources from AWS and pay only for what you actually use. Explore Key Advantages Cost Savings: With the "Pay-as-you-go" model, you don't need a massive upfront investment in hardware. You only pay for the resources you consume. Scalability: You can instantly increase or decrease resources (like CPU, RAM, or storage) based on your real-time traffic. Security & Reliability: AWS meets strict international security standards (ISO, PCI DSS, etc.). Their global infrastructure ensures your system stays up and running 24/7. Massive Ecosystem: It provides everything from basic tools (servers, storage) to advanced tech (AI, Machine Learning, and IoT). When Should You Use It? Startups: Perfect for launching ...

Setting Up IAM Roles Anywhere instead of Access Keys in AWS

Image
Introduction Setting up IAM Roles Anywhere is the "gold standard" for bringing the power of IAM Roles to external servers (On-premises, Azure, GCP) without needing permanent, risky Access Keys. This mechanism relies on PKI (Public Key Infrastructure): You use a digital certificate to prove your identity to AWS, and in return, AWS provides you with temporary, short-lived credentials. Prerequisites Before we begin, you should have a basic understanding of IAM Identity Center and how to set up AWS Access Keys/Secrets, as this guide builds upon those concepts. Quick Recap If you have already set up a profile and logged in via SSO, you would typically use that profile in a NestJS source code like this: import { Injectable } from '@nestjs/common' import { getSignedUrl } from '@aws-sdk/s3-request-presigner' import { ConfigService } from '@nestjs/config' import {   S3Client ,   ListObjectsV2Command ,   GetObjectCommand , } from '@aws-sdk/client-s3...