Articles in this series
Whenever an IAM user is created, it's best if it is tagged. The reason is simple... It gives more information about the user. One of the use-cases for...
Maintain least privilege access every day! ยท Creating an AWS IAM user is a common activity to access the AWS resources. Most often, the IAM user created...
Ensure secure authentication by attaching a policy to enforce MFA to IAM users ยท Welcome to yet another blog post, where we learn how to enforce...
Get real-time alerts whenever an important AWS service is changed ยท Welcome to yet another blog post from the series "AWS security at scale". In this...
A blog on how to deactivate dormant IAM users by implementing Security at scale. ยท Overview It often happens that the employees create AWS IAM users to...