In this video, you will be introduced to the AWS Command Line Interface (CLI). You will learn where to obtain it, and how to use credential profiles from the AWS Command Line Interface (CLI). These different profiles possess the access key and secret access key for different IAM users. You will use the CLI to validate that the bucket policy is functioning as intended.
- [Voiceover] Here I am with a terminal window…on my local Mac.…I have already installed the AWS CLI.…If you need to download it, it's pretty easy to do.…Just pop open a new web browser…and google search for download AWS CLI.…Clicking on the first link will take you…to Amazon Documentation…with instructions on how to download…and install the CLI for your specific platform.…I've also set up a configuration file for the credentials…I want to use with the AWS CLI.…
I'll show it to you now.…I'm going to use the VI Editor…to open the credentials file and look at it.…The profile I'm interest in is the madeline.dev profile.…As you can see, it specifies her access key ID…and the associated secret access key.…This combination will allow me to use the CLI…as the madeline AIM user…from the development AWS account.…Putting out of the editor, let's list the contents…of the S3 bucket as Madeline.…
It's kind of a long command,…so let's deconstruct it briefly.…Using the AWS CLI,…we want to use the S3 component…to list the contents of this bucket.…
Sharif Nijim couples pragmatic advice with practical examples that educate organizations on how to create a secure infrastructure within Amazon Web Services. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key identity and access management concepts: users, groups, roles, and policies. At the end of the course, he helps you prepare for the inevitable audit of your AWS account(s).
- The AWS shared responsibility model and security landscape
- Enabling CloudTrail
- Configuring AWS Identity and Access Management (IAM)
- Troubleshooting IAM policies
- Granting temporary access
- Incorporating least privilege
- Controlling access to Simple Storage Service (S3)
- Preparing for security audits
- Getting audit help from Trusted Advisor