iam
https://github.com/ballerine-io/ballerine
https://github.com/ballerine-io/ballerine
Open-source infrastructure and data orchestration platform for risk decisioning - ballerine-io/ballerine
Added 1 month ago
Federate Kubernetes with AWS IAM using OIDC · reecetech
https://reece.tech/posts/oidc-k8s-to-aws/
Added 1 month ago
https://aws.amazon.com/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-and-test-environments/?sc_channel=sm&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_centralize_automate_IAM&linkId=62045363
https://aws.amazon.com/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-and-test-environments/?sc_channel=sm&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_centralize_automate_IAM&linkId=62045363
To keep pace with AWS innovation, many customers allow their application teams to experiment with AWS services in sandbox environments as they move toward production-ready architecture. These teams need timely access to various sets of AWS services and resources, which means they also need a mechanism to help ensure least privilege is granted. In other […]
Added 1 month ago
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=iamresourcebasedpolicies&sc_category=AWS_Identity_and_Access_Management&linkId=46974513
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=iamresourcebasedpolicies&sc_category=AWS_Identity_and_Access_Management&linkId=46974513
Define permissions on a resource in order to grant IAM users access to resources in other AWS accounts.
Broken