How to access your AWS account

How to access your AWS account

Are you going to log-in AWS with your root account credentials? Or it's better to generate a new user? Or maybe use a role? This post A review of all access patterns and strategies to choose the best way to access your AWS account.

Hey there. You just created your first AWS account, and you can’t wait to dive into all the exciting services and technologies that AWS has to offer you to start to build the next big thing. But, wait for a second… are you going to log-in with your root account credentials? Or it’s better to generate a new user? Or maybe use a role?

Slow down a minute, and by the end of the blog post, I promise you will be able to choose the best way to access your AWS account securely.

Beware, though, we will consider access to a single AWS account as we will cover multi-account strategies the next time. We need to walk before we can run, right?

aws-iam aws security

What is Geek Coin

What is GeekCash, Geek Token

Best Visual Studio Code Themes of 2021

Bootstrap 5 Tutorial - Bootstrap 5 Crash Course for Beginners

Nest.JS Tutorial for Beginners

Hello Vue 3: A First Look at Vue 3 and the Composition API

How to Use AWS IAM Role on AWS EKS PODs

Using a native-AWS way to use an AWS IAM Role in an EKS POD, without using third-party software. Reducing the latency, and improving your EKS security. Build, Deploy, and Manage Websites, Apps or Processes On AWS' Secure, Reliable Network. Sign Up for a Free Account & Experience AWS' Secure, Reliable, Scalable...

Custom IAM role & Policy | AWS IAM Tutorial | AWS identity and access management (iam)

So In this video tutorial, I will show you guys iam role and policy , step by step how to create custom iam role and policy , How to manage aws iam services ...

9 AWS Security Best Practices: Securing Your AWS Cloud

In this blog post, I have. 9 AWS Security Best Practices: Securing Your AWS Cloud - Working with Amazon facilities, it is necessary to implement AWS security best practices to ensure the safety of the data and the cloud. How a secure is my virtual data? Make Your Security Policy Comprehensive.

50+ Useful Kubernetes Tools for 2020 - Part 2

Our original Kubernetes tool list was so popular that we've curated another great list of tools to help you improve your functionality with the platform.

An Overview of Users Vs Roles in AWS IAM

How do you give them temporary access to your AWS resources? How do you make sure no one else accesses your resources and runs up a huge bill? Do you make them a user? Do they just need a role? An Overview of Users Vs Roles in AWS IAM.