In this post we are going to begin a series focused on Python. We are going to examine the theoretical foundations of Python, how code is run, and then into the actual building blocks and data types that we will have access to when writing programs.
continue readingIAM Users And Groups
We are going to be talking about AWS Identity and Access Management (IAM) beginning with this post. If you have read through the previous two AWS posts then you should have already set up a labuser account and admin group.
Continue readingSecuring THE AWS ROOT USER ACCOUNT PART 2
In the last post for AWS we began to secure the root user account. We have already deleted the root access keys and activated MFA on our root account. In this post we will look at the final three items listed on the IAM Dashboard Security Status list.
Continue readingDocker Images
We have set up Docker and introduced the Docker Hub in the previous Discovering Docker posts. In this post we will discuss Docker images and how they are used and then in the next post we will create a Docker image.
Continue readingSecuring The AWS Root User Account Part 1
A new AWS account will include a root user account that will be initially configured with a single sign-in identity. This account will be able to access all AWS services and resources and it must be protected. It is considered best practice to not use this account for our everyday tasks. This includes administrative tasks which should be completed via an IAM User with administrative privileges.
continue reading