The Everyday Technology Blog. I cover topics about Technology, Entrepreneurship, AWS Cloud, Linux.
Share
NedFollowHello, I'm Nedim, a Cloud Engineer who enjoys writing about technology, particularly focusing on Linux and DevOps. Recently, I've been delving into topics like digital marketing, online presence, and startup culture.
Developer Read-Only AWS IAM Group on AWS Cloud with Terraform
One of the first things I do when setting up a Cloud account on AWS for any client is to set up an IAM group for developers. Most of the time the Developers just need a read-only group that will enable them to access resources but not modify anything. Therefore they need to view logs and easily debug while being restricted not to doing something stupid and accidentally deleting a resource.
Define the Group
Here we define the IAM group.
Attach AWS Managed Policies
Here we attach AWS-managed read-only policies to the previously created IAM group.
Custom Policy
Here we create a custom IAM policy and attach it to the IAM group. This is where you can add custom permissions to the policies that are not covered by the AWS-managed ones.
Here we attach the custom policy to the group.
Here we attach the custom policy to the developer_read_only_group group.
User Management
Now that we have all IAM groups and policies in place we can focus on creating a user and assigning groups to the users.
Attach the AWS Change Password Policy
Here we attach the AWS managed change password policy. This will permit the user to change their password.
Conclusion
In this article, I covered how to create a read-only IAM group with AWS-managed and custom policies, and user management. This is very useful for every Cloud Engineer.