Never use the root account for any other purpose other than setting up other less privileged AWS accountsOne AWS user…
IAM Security Tools within AWS
Reporting-wise there is the IAM Credentials Report which is based at account level and will display a list of all…
IAM Roles for Services
IAM Roles for Services or running AWS Services under a set of specified permissions With security, always adhere to the…
What is CloudShell?
CloudShell is an alternative to the Terminal CLI and is a way to issue commands against AWS. Note that CloudShell…
How to access AWS?
There are three options: AWS Management Console which is protected by a password and a MFA device AWS Command Line…
What is Multi-Factor Authentication in AWS
A way to protect your AWS Accounts via Multi-Factor Authentication by way of Password that you know as well as…
Important Ports
The following are the most common ports you may encounter: Port 21 – FTP (File Transfer Protocol) used to connect…
AWS Security Groups
Security groups are fundamental to network security in AWS and are used to control the flow of traffic into and…
What determines the best way to choose an AWS region?
There are a number of factors to consider when choosing an AWS region and these include: How close the region…
Principles of Software Development
When developing Software it is important to: Understand that implementations pertaining to Software Development may differ from company to company…