Enforcing Least Privilege in AWS IAM with Access Analyzer and Last Access Data

This article shows how to audit and refine IAM permissions using Access Analyzer, CloudTrail, and service access history — enforcing least privilege the right way in AWS.

June 9, 2025 · 3 min · 516 words · Javier Pulido

Securing EC2 Access with AWS Systems Manager Session Manager: Eliminating SSH

Introduction Traditional SSH access to EC2 instances poses several security challenges, including the management of SSH keys, exposure of ports, and lack of centralized auditing. AWS Systems Manager Session Manager offers a secure and auditable alternative, allowing you to manage EC2 instances without opening inbound ports or maintaining bastion hosts. This guide provides a step-by-step approach to configuring Session Manager for secure EC2 access, aligning with AWS’s official documentation and best practices. ...

June 3, 2025 · 7 min · 1324 words · Javier Pulido

Securing Temporary Credentials in AWS: Best Practices for Safe Role Usage

Temporary credentials are one of the most powerful — and misunderstood — access mechanisms in AWS. They’re essential for enabling short-lived, tightly scoped access without the long-term baggage of static IAM user credentials. But with this flexibility comes a new surface for mistakes, misuse, and oversights. In this post, I’ll walk through the core use cases for temporary credentials, how they work, where they go wrong, and the best ways to keep them secure in your environment. ...

May 11, 2025 · 4 min · 763 words · Javier Pulido

Building Least-Privilege IAM Roles with IAM Access Analyzer

Use IAM Access Analyzer to build least-privilege IAM roles in AWS — includes policy generation from CloudTrail, Terraform integration, and AWS best practices.

April 21, 2025 · 4 min · 799 words · Javier Pulido

AWS Security Checklist 2025: 10 Critical Steps to Secure Your Cloud

A step-by-step checklist to secure your AWS account in 2025 — includes IAM hardening, S3 lockdown, logging, and budget alerts. Beginner to intermediate friendly.

April 20, 2025 · 3 min · 540 words · Javier Pulido

IAM Users Are Dead: Modern AWS Access Control for 2025

Stop using IAM users in AWS. This guide explains why they’re risky and how to migrate to Identity Center, STS, and OIDC-based access — step-by-step.

April 20, 2025 · 3 min · 437 words · Javier Pulido

5 Critical AWS Security Misconfigurations (2025 Edition) – How to Find & Fix Them

Five AWS misconfigurations still causing breaches in 2025 — includes fixes for public S3 buckets, over-permissive IAM, open security groups, and missing monitoring.

April 19, 2025 · 4 min · 645 words · Javier Pulido