Secure AWS with IAM built for continuous delivery

Download Your Free ‘Effective IAM for AWS’ EPUB or PDF

Effective IAM for Amazon Web Services is for Cloud engineers who design, develop, and review AWS IAM security policies in their daily work.

If you’re struggling to deliver effective AWS security policies, this guide will help you understand why it’s hard and how both you and your organization can secure your cloud with IAM.

The AWS IAM documentation tells you what you can do. This guide will show you how to scale IAM best practices to all developers.

Learn how to:

  • solve difficult security problems using the best parts of AWS IAM
  • simplify AWS IAM into a set of secure infrastructure code building blocks to deliver changes quickly
  • verify AWS IAM security policies protect resources as intended
  • secure IAM continuously at any scale

Effective IAM for AWS

Effective IAM book

Learn how to secure AWS with IAM built for continuous delivery.

Stephen Kuenzli

 About The Author

My name is Stephen Kuenzli and I have built, delivered, and operated applications and infrastructure for more than 20 years. I’ve successfully led several large migrations to AWS and I know how difficult it is to create good IAM security policies for people and applications, verify they work as intended, and continuously deliver changes. (We’re building k9 Security to simplify that.)

In this book, I’ll share insights into the problems at the intersection of AWS IAM, infrastructure code, and continuous delivery that frustrate so many Cloud teams. I’ll also give you proven solutions to those problems that work regardless of which tools you use.

IAM is HARD. Even AWS fails at it sometimes, in practice or in documentation. One of the best pieces of advice I give to my customers when I’m running AWS Security assessments is to recommend this book as a starting point for least privilege and a better understanding of the IAM landscape on AWS. It contains many examples and schemas that help to get a clear view of how IAM works under the hood, and what you can do to attain best security practices.

Victor Grenu