I was working on Access control but when I see the surprising control of the AWS IAM, I got stuck! It was really super advanced.
You can manage access at an individual level or group users into roles ...
The landscape of credential security has shifted dramatically in recent years, with a notable transformation in both the volume and nature of secrets embedded in code. According to GitGuardian's 2025...
🔐 How to Access Amazon EKS from a Jumphost (Modern Access Entries Method)
Amazon EKS Access Entries let you assign Kubernetes API permissions to IAM identities without modifying the legacy...
What is a MCP server?
LLMs are like genies trapped in a bottle: their knowledge is limited by their training data, specifically their knowledge cutoff date, and they can't take actions.Severa...
In my previous post, I introduced AWS Service Reference Information MCP Server, a Model Context Protocol server exposing AWS Authorization Reference data to LLMs. To illustrate how up-to-date, scoped,...
What is an IAM provider?
An Identity and Access Management (IAM) provider is a system that ensures secure, controlled access to resources. It combines four pillars:
Authentication: Verifying...
Amazon Web Services (AWS) is a popular cloud provider that allows businesses to store data and run applications online. While AWS provides security for its infrastructure, customers must also take ste...
In a modern enterprise architecture, cloud resources are typically managed by individual teams and organized across multiple AWS accounts. However, certain resources are deliberately designated as sha...
The Challenge of Permission Discovery
CloudFormation Resource Schemas: A Complementary Approach
Practical Example: Discovering IAM Permissions for Amazon S3 Bucket
Step 1: Locate the Resource Sche...
In simple terms, IAM is a fundamental web service within AWS that allows you to securely control access to your AWS services and resources. It acts like the central security system for your entire AWS...