Book Image

Implementing Cloud Design Patterns for AWS - Second Edition

By : Sean Keery, Clive Harber, Marcus Young
Book Image

Implementing Cloud Design Patterns for AWS - Second Edition

By: Sean Keery, Clive Harber, Marcus Young

Overview of this book

Whether you're just getting your feet wet in cloud infrastructure or already creating complex systems, this book will guide you through using the patterns to fit your system needs. Starting with patterns that cover basic processes such as source control and infrastructure-as-code, the book goes on to introduce cloud security practices. You'll then cover patterns of availability and scalability and get acquainted with the ephemeral nature of cloud environments. You'll also explore advanced DevOps patterns in operations and maintenance, before focusing on virtualization patterns such as containerization and serverless computing. In the final leg of your journey, this book will delve into data persistence and visualization patterns. You'll get to grips with architectures for processing static and dynamic data, as well as practices for managing streaming data. By the end of this book, you will be able to design applications that are tolerant of underlying hardware failures, resilient against an unexpected influx of data, and easy to manage and replicate.
Table of Contents (20 chapters)
Title Page
Dedication
About Packt
Contributors
Preface
Free Chapter
1
Introduction to Amazon Web Services
Index

More IAM


Before going any further, to gain an extra layer of protection for your cloud, we recommend you enable multi-factor authentication for all of your users. In addition to something they know, users are required to provide something they have (a token). In combination with a fingerprint scanner on a smartphone (something they have), MFA lessens the probability of compromised credentials.

 

 

Terraform is unable to set up MFA, but you can do it in the console or with the AWS CLI using the following command:

aws iam enable-mfa-device
--user-name <value>
--serial-number <value>
--authentication-code1 <value>
--authentication-code2 <value>
[--cli-input-json <value>]
[--generate-cli-skeleton <value>]

We are not going to automate this as the values must be obtained from a physical device in most cases. 

Note

The supported device list can be found here: https://aws.amazon.com/iam/details/mfa/.

Users

We covered Active Directory integration, but what about other options...