Understanding and Security of AWS Cloud IAM Used in Practice
You can learn about IAM, the foundation of AWS Zero Trust, from the most basic elements to the most detailed specifics. Through this, you can learn which parts may actually be vulnerable and where you need to pay more attention.
443 learners
Level Basic
Course period Unlimited

News
5 articles
Hello. I am knowledge sharer Cheon Kang-min.
This time, I'm planning to release a course called "Docker and Containers for Beginners" (the opening date is not yet set).
Accordingly, we would like to hold a student registration event to express our gratitude to those who are taking the courses listed below.
Please check the lecture content to be released through Google Form , fill out the form and apply, and we will proceed with additional courses as time allows.
However, please note that the course will not appear on the course list until the actual course is released.We will always strive to provide quality lectures.
thank you
hello.
This is Kangmin Cheon, an instructor for understanding and securing AWS Cloud IAM used in practice.
We've added a description and a hands-on video of the newly released AWS EKS Pod Identity feature.
Why it was released and what's improved
How it works internally
Things to watch out for when migrating
If you look at it broadly, the content is as above.
To increase understanding between the jobs that I consider important, I have also racked my brain and prepared various case studies (nothing grandiose...).
We hope you enjoy it as we leave behind the inconvenient IRSA and usher in the era of AWS EKS Pod Identity.
thank you
hello.
This is Kangmin Cheon, an instructor for understanding and securing AWS Cloud IAM used in practice.
We are happy to announce that, as of today, we will be removing “Part 1” from the course title and launching the RolesAnywhere course .
Actually, I was thinking of dividing the current lecture into three parts.
It was something like "Part 1: Basics, Part 2: Applications, and Part 3: Attacks."
As you left in "I'm worried", I felt that it was too irresponsible as there was a lack of actual use cases (of course, gitops was added), and there was no telling when part 2/3 would come out.
So, I removed the word "Part 1" from the course title and added the RolesAnywhere content.
[RolesAnywhere]

It consists of the above content, and was created based on my experience using RolesAnywhere since its launch (with a quality that I believe can be applied directly to practice).Please note. Additionally, the ending part has been deleted from the video, but I cannot delete the section on my own, so I will contact you and take action to make it look clean.
thank you
hello.
Understanding and Securing AWS Cloud IAM in Practice - Part 1 Instructor: Cheon Kang-min.
We are happy to announce that id_tokens are now available globally starting with GitLab 16.4.
I wish it had been out there when I was making the original project, but I'm glad it's out now. The before/after changes are as follows.
[Before change]
I had to set id_tokens for each job. Therefore, I used the Anchor function in the project as follows..tf_base: &tf_base id_tokens: GITLAB_OIDC_TOKEN: aud: https://gitlab.com before_script: - source ./tf_base.sh # https://www.tutorialspoint.com/linux-source-command - cd ${TF_PATH} init: <<: *tf_base ...[After change]
Now, rather than being assigned per job, it can be used globally under the default keyword .default: ... id_tokens: GITLAB_OIDC_TOKEN: aud: https://gitlab.com .tf_base: &tf_base before_script: - source ./tf_base.sh # https://www.tutorialspoint.com/linux-source-command - cd ${TF_PATH} init: <<: *tf_base ...thank you
hello.
Understanding and Securing AWS Cloud IAM in Practice - Part 1 Instructor: Cheon Kang-min.
The aws-iam-gitops project lecture has been completed and we are happy to announce the news.
First, to put it simply, here's what you'll learn:
Understanding GitLab CI/CD
Using GitLab CI/CD <-> AWS keyless roles
Configuring the Terraform DevSecOps Pipeline
At first, I was only going to cover AWS role integration via OIDC tokens from GitLab or GitHub, but I thought it would be nice to cover the most important but tricky "supply chain security" all at once, so I prepared a separate project.
If you approach it with the mindset of 'Ah, so this is what CI/CD or gitops is!', I think it will be helpful in applying SAST and DAST in practice.
thank you

