Building Serverless Web Applications
上QQ阅读APP看书,第一时间看更新

AWS IAM

When you create your AWS account, you receive a root user with full access. It can create/delete and start/stop any service. That's great for learning, but you shouldn't use it when developing a real project. In information security, the principle of least privilege requires that a user or program must be able to access only the information or resources that are necessary for its legitimate purpose. In case your access keys are compromised, the damage will be reduced if the access scope is restricted.

Traceability is another important aspect. You shouldn't share your user with others. It's really important that each person has their own user. AWS offers CloudTrail as a tool to track user activity and API usage.

So, you need to learn how to create user accounts and application keys with restricted access using Identity and Access Management (IAM). As we don't have applications keys yet, we will configure security using the IAM Management Console.