#90daysofdevops
Read more stories on Hashnode
Articles with this tag
What is Switching: Say we have 2 computer/ VMs on cloud or desktops. How does system-A reach system-B? We connect them to a switch, which creates the...
A resource-based policy is directly attached to a resource (e.g., an S3 bucket, a DynamoDB table, etc.) and defines who can access the resource. Key...
IAM Groups: IAM Groups are used to manage users. Here are some best practices for IAM Groups: Simplify User Management: IAM Groups make managing...
IAM Users: IAM users are created within an AWS account and represent a person or application that interacts with AWS services. Each IAM user has a...
Introduction to AWS Identity and Access management(IAM): This is a service used for "security" and "access control" in AWS cloud. Overview of IAM: IAM...
Launch your Ubuntu instance: Ensure that the security group associated with the instance allows inbound traffic on the following ports: SSH (port...