SlideShare a Scribd company logo
Communit
y
AWS Community
How To Get Rid of Hard-coded Credential
and Reduce Data Leakage Risks with
aws-vault
Vladimir Cageyv Samoylov
AWS Community
Key Takeaway
Understand how to minimize frictions on application
development by using 3rd party tool, aws-vault, in your local development environment.
Static IAM Access Keys should not be used in modern applications or/and on developers machines.
AWS Community
A common simple workflow
Dev Stage Prod
But, what happens before dev
environment?
AWS Community
Local environment
Dev Stage Prod
Local
AWS Community
Local development and fixing bugs
But what if code depends on AWS
Services?
AWS Community
Let’s ask search engine, GPT or Stack Overflow
And the most popular answers will suggest you to go and create IAM User and STATIC Access Key :(
AWS Community
AWS Community
Static credentials stored locally
AWS Community
Temporary credentials stored locally
“Only amateurs attack machines;
professionals target people.”
Bruce Schneier,
American cryptographer, writer and computer security specialist
aws-vault - A vault for securely storing
and accessing AWS credentials in
development environments
AWS Community
How it works and how aws-vault store creds
AWS Vault stores IAM credentials in your operating system's secure keystore and then generates
temporary credentials from those to expose to your shell and applications. It's designed to be
complementary to the AWS CLI tools, and is aware of your profiles and configuration in
~/.aws/config.
MacOS
KeyChain
Ubuntu
Gnome Keyring
Windows
Credential Manager
AWS Community
AWS Security Token Service (AWS STS)
AWS provides AWS Security Token Service (AWS STS) as a web service that enables you to request
temporary, limited-privilege credentials for users
Source: https://blog.knoldus.com/deep-dive-aws-temporary-security-credentials-assumerole-and-iam-role/
AWS Community
Top use cases with aws-vault in daily life
- No more temporary keys inside ~/.aws/sso/cache
- Login to AWS Console
- Local runs with an without containers
- Emulate ECS/EC2
- Unit tests with AWS Services and Localstack emulation
- More use cases: https://github.com/99designs/aws-vault/blob/master/USAGE.md
- aws-vault-examples: https://github.com/cageyv/aws-vault-examples
Thank you
Contacts:
● https://t.me/cageyv
● https://cageyv.dev/
● https://github.com/cageyv/
● https://www.linkedin.com/in/vladimirsamoylov
/
Useful links:
● https://github.com/99designs/aws-vault
● https://github.com/cageyv/aws-vault-examples
● https://docs.aws.amazon.com/cli/latest/usergui
de/getting-started-install.html
● https://docs.aws.amazon.com/STS/latest/APIRe
ference/welcome.html
Ad

More Related Content

Similar to Security Basics in AWS or How To Get Rid of Hardcoded Credential and Reduce Data Leakage Risks with aws-vault (7)

The iot acdemy_awstraining_part4_aws_lab
The iot acdemy_awstraining_part4_aws_labThe iot acdemy_awstraining_part4_aws_lab
The iot acdemy_awstraining_part4_aws_lab
The IOT Academy
 
Best Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWSBest Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWS
Zlatan Dzinic
 
beAuth
beAuthbeAuth
beAuth
AWS User Group Italy
 
Cloudformation & VPC, EC2, RDS
Cloudformation & VPC, EC2, RDSCloudformation & VPC, EC2, RDS
Cloudformation & VPC, EC2, RDS
Can Abacıgil
 
Demystifying identity on AWS
Demystifying identity on AWSDemystifying identity on AWS
Demystifying identity on AWS
AWS User Group Bengaluru
 
AWS Cyber Security Best Practices
AWS Cyber Security Best PracticesAWS Cyber Security Best Practices
AWS Cyber Security Best Practices
DoiT International
 
AWS Security and Compliance Presentation
AWS Security and Compliance PresentationAWS Security and Compliance Presentation
AWS Security and Compliance Presentation
goutamnita
 
The iot acdemy_awstraining_part4_aws_lab
The iot acdemy_awstraining_part4_aws_labThe iot acdemy_awstraining_part4_aws_lab
The iot acdemy_awstraining_part4_aws_lab
The IOT Academy
 
Best Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWSBest Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWS
Zlatan Dzinic
 
Cloudformation & VPC, EC2, RDS
Cloudformation & VPC, EC2, RDSCloudformation & VPC, EC2, RDS
Cloudformation & VPC, EC2, RDS
Can Abacıgil
 
AWS Cyber Security Best Practices
AWS Cyber Security Best PracticesAWS Cyber Security Best Practices
AWS Cyber Security Best Practices
DoiT International
 
AWS Security and Compliance Presentation
AWS Security and Compliance PresentationAWS Security and Compliance Presentation
AWS Security and Compliance Presentation
goutamnita
 

More from Vladimir Samoylov (7)

MVP on AWS PostgreSQL. Common mistakes. How to avoid them?
MVP on AWS PostgreSQL. Common mistakes. How to avoid them?MVP on AWS PostgreSQL. Common mistakes. How to avoid them?
MVP on AWS PostgreSQL. Common mistakes. How to avoid them?
Vladimir Samoylov
 
Why is RDS not just an Open-Source PostgreSQL_ From Classic RDS to Aurora DSQL
Why is RDS not just an Open-Source PostgreSQL_ From Classic RDS to Aurora DSQLWhy is RDS not just an Open-Source PostgreSQL_ From Classic RDS to Aurora DSQL
Why is RDS not just an Open-Source PostgreSQL_ From Classic RDS to Aurora DSQL
Vladimir Samoylov
 
Getting started with Amazon Bedrock IDE and Control Tower
Getting started with Amazon Bedrock IDE and Control TowerGetting started with Amazon Bedrock IDE and Control Tower
Getting started with Amazon Bedrock IDE and Control Tower
Vladimir Samoylov
 
AWS RDS Data API and CloudTrail. Who drop the table_.pdf
AWS RDS Data API and CloudTrail. Who drop the table_.pdfAWS RDS Data API and CloudTrail. Who drop the table_.pdf
AWS RDS Data API and CloudTrail. Who drop the table_.pdf
Vladimir Samoylov
 
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Vladimir Samoylov
 
AWS Spot Pricing with Terraform [ENG 2023]
AWS Spot Pricing with Terraform [ENG 2023]AWS Spot Pricing with Terraform [ENG 2023]
AWS Spot Pricing with Terraform [ENG 2023]
Vladimir Samoylov
 
AWS Spot pricing with Terraform
AWS Spot pricing with TerraformAWS Spot pricing with Terraform
AWS Spot pricing with Terraform
Vladimir Samoylov
 
MVP on AWS PostgreSQL. Common mistakes. How to avoid them?
MVP on AWS PostgreSQL. Common mistakes. How to avoid them?MVP on AWS PostgreSQL. Common mistakes. How to avoid them?
MVP on AWS PostgreSQL. Common mistakes. How to avoid them?
Vladimir Samoylov
 
Why is RDS not just an Open-Source PostgreSQL_ From Classic RDS to Aurora DSQL
Why is RDS not just an Open-Source PostgreSQL_ From Classic RDS to Aurora DSQLWhy is RDS not just an Open-Source PostgreSQL_ From Classic RDS to Aurora DSQL
Why is RDS not just an Open-Source PostgreSQL_ From Classic RDS to Aurora DSQL
Vladimir Samoylov
 
Getting started with Amazon Bedrock IDE and Control Tower
Getting started with Amazon Bedrock IDE and Control TowerGetting started with Amazon Bedrock IDE and Control Tower
Getting started with Amazon Bedrock IDE and Control Tower
Vladimir Samoylov
 
AWS RDS Data API and CloudTrail. Who drop the table_.pdf
AWS RDS Data API and CloudTrail. Who drop the table_.pdfAWS RDS Data API and CloudTrail. Who drop the table_.pdf
AWS RDS Data API and CloudTrail. Who drop the table_.pdf
Vladimir Samoylov
 
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Vladimir Samoylov
 
AWS Spot Pricing with Terraform [ENG 2023]
AWS Spot Pricing with Terraform [ENG 2023]AWS Spot Pricing with Terraform [ENG 2023]
AWS Spot Pricing with Terraform [ENG 2023]
Vladimir Samoylov
 
AWS Spot pricing with Terraform
AWS Spot pricing with TerraformAWS Spot pricing with Terraform
AWS Spot pricing with Terraform
Vladimir Samoylov
 
Ad

Recently uploaded (20)

Besu Shibpur Enquesta 2012 Intra College General Quiz Finals.pptx
Besu Shibpur Enquesta 2012 Intra College General Quiz Finals.pptxBesu Shibpur Enquesta 2012 Intra College General Quiz Finals.pptx
Besu Shibpur Enquesta 2012 Intra College General Quiz Finals.pptx
Rajdeep Chakraborty
 
Approach to diabetes Mellitus, diagnosis
Approach to diabetes Mellitus,  diagnosisApproach to diabetes Mellitus,  diagnosis
Approach to diabetes Mellitus, diagnosis
Mohammed Ahmed Bamashmos
 
Profit Growth Drivers for Small Business.pdf
Profit Growth Drivers for Small Business.pdfProfit Growth Drivers for Small Business.pdf
Profit Growth Drivers for Small Business.pdf
TheodoreHawkins
 
cardiovascular outcome in trial of new antidiabetic drugs
cardiovascular outcome in trial of new antidiabetic drugscardiovascular outcome in trial of new antidiabetic drugs
cardiovascular outcome in trial of new antidiabetic drugs
Mohammed Ahmed Bamashmos
 
Setup & Implementation of OutSystems Cloud Connector ODC
Setup & Implementation of OutSystems Cloud Connector ODCSetup & Implementation of OutSystems Cloud Connector ODC
Setup & Implementation of OutSystems Cloud Connector ODC
outsystemspuneusergr
 
The Business Dynamics of Quick Commerce.pdf
The Business Dynamics of Quick Commerce.pdfThe Business Dynamics of Quick Commerce.pdf
The Business Dynamics of Quick Commerce.pdf
RDinuRao
 
Speech 3-A Vision for Tomorrow for GE2025
Speech 3-A Vision for Tomorrow for GE2025Speech 3-A Vision for Tomorrow for GE2025
Speech 3-A Vision for Tomorrow for GE2025
Noraini Yunus
 
Bidding World Conference 2027 - NSGF Mexico.pdf
Bidding World Conference 2027 - NSGF Mexico.pdfBidding World Conference 2027 - NSGF Mexico.pdf
Bidding World Conference 2027 - NSGF Mexico.pdf
ISGF - International Scout and Guide Fellowship
 
Bidding World Conference 2027 - Ghana.pptx
Bidding World Conference 2027 - Ghana.pptxBidding World Conference 2027 - Ghana.pptx
Bidding World Conference 2027 - Ghana.pptx
ISGF - International Scout and Guide Fellowship
 
kurtlewin theory of motivation -181226082203.pptx
kurtlewin theory of motivation -181226082203.pptxkurtlewin theory of motivation -181226082203.pptx
kurtlewin theory of motivation -181226082203.pptx
TayyabaSiddiqui12
 
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
ASHISHKUMAR504404
 
Lec 3 - Chapter 2 Carl Jung’s Theory of Personality.pptx
Lec 3 - Chapter 2 Carl Jung’s Theory of Personality.pptxLec 3 - Chapter 2 Carl Jung’s Theory of Personality.pptx
Lec 3 - Chapter 2 Carl Jung’s Theory of Personality.pptx
TayyabaSiddiqui12
 
Wood Age and Trees of life - talk at Newcastle City Library
Wood Age and Trees of life - talk at Newcastle City LibraryWood Age and Trees of life - talk at Newcastle City Library
Wood Age and Trees of life - talk at Newcastle City Library
Woods for the Trees
 
Speech 2-Unity in Diversity, Strength in Solidarity
Speech 2-Unity in Diversity, Strength in SolidaritySpeech 2-Unity in Diversity, Strength in Solidarity
Speech 2-Unity in Diversity, Strength in Solidarity
Noraini Yunus
 
Bidding World Conference 2027-NSGF Senegal.pdf
Bidding World Conference 2027-NSGF Senegal.pdfBidding World Conference 2027-NSGF Senegal.pdf
Bidding World Conference 2027-NSGF Senegal.pdf
ISGF - International Scout and Guide Fellowship
 
ICSE 2025 Keynote: Software Sustainability and its Engineering: How far have ...
ICSE 2025 Keynote: Software Sustainability and its Engineering: How far have ...ICSE 2025 Keynote: Software Sustainability and its Engineering: How far have ...
ICSE 2025 Keynote: Software Sustainability and its Engineering: How far have ...
patricialago3459
 
Bloom Where You Are Planted 05.04.2025.pptx
Bloom Where You Are Planted 05.04.2025.pptxBloom Where You Are Planted 05.04.2025.pptx
Bloom Where You Are Planted 05.04.2025.pptx
FamilyWorshipCenterD
 
Reflections on an ngo peace conference in zimbabwe
Reflections on an ngo peace conference in zimbabweReflections on an ngo peace conference in zimbabwe
Reflections on an ngo peace conference in zimbabwe
jujuaw05
 
fundamentals of communicationclass notes.pptx
fundamentals of communicationclass notes.pptxfundamentals of communicationclass notes.pptx
fundamentals of communicationclass notes.pptx
Sunkod
 
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
ASHISHKUMAR504404
 
Besu Shibpur Enquesta 2012 Intra College General Quiz Finals.pptx
Besu Shibpur Enquesta 2012 Intra College General Quiz Finals.pptxBesu Shibpur Enquesta 2012 Intra College General Quiz Finals.pptx
Besu Shibpur Enquesta 2012 Intra College General Quiz Finals.pptx
Rajdeep Chakraborty
 
Profit Growth Drivers for Small Business.pdf
Profit Growth Drivers for Small Business.pdfProfit Growth Drivers for Small Business.pdf
Profit Growth Drivers for Small Business.pdf
TheodoreHawkins
 
cardiovascular outcome in trial of new antidiabetic drugs
cardiovascular outcome in trial of new antidiabetic drugscardiovascular outcome in trial of new antidiabetic drugs
cardiovascular outcome in trial of new antidiabetic drugs
Mohammed Ahmed Bamashmos
 
Setup & Implementation of OutSystems Cloud Connector ODC
Setup & Implementation of OutSystems Cloud Connector ODCSetup & Implementation of OutSystems Cloud Connector ODC
Setup & Implementation of OutSystems Cloud Connector ODC
outsystemspuneusergr
 
The Business Dynamics of Quick Commerce.pdf
The Business Dynamics of Quick Commerce.pdfThe Business Dynamics of Quick Commerce.pdf
The Business Dynamics of Quick Commerce.pdf
RDinuRao
 
Speech 3-A Vision for Tomorrow for GE2025
Speech 3-A Vision for Tomorrow for GE2025Speech 3-A Vision for Tomorrow for GE2025
Speech 3-A Vision for Tomorrow for GE2025
Noraini Yunus
 
kurtlewin theory of motivation -181226082203.pptx
kurtlewin theory of motivation -181226082203.pptxkurtlewin theory of motivation -181226082203.pptx
kurtlewin theory of motivation -181226082203.pptx
TayyabaSiddiqui12
 
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
ASHISHKUMAR504404
 
Lec 3 - Chapter 2 Carl Jung’s Theory of Personality.pptx
Lec 3 - Chapter 2 Carl Jung’s Theory of Personality.pptxLec 3 - Chapter 2 Carl Jung’s Theory of Personality.pptx
Lec 3 - Chapter 2 Carl Jung’s Theory of Personality.pptx
TayyabaSiddiqui12
 
Wood Age and Trees of life - talk at Newcastle City Library
Wood Age and Trees of life - talk at Newcastle City LibraryWood Age and Trees of life - talk at Newcastle City Library
Wood Age and Trees of life - talk at Newcastle City Library
Woods for the Trees
 
Speech 2-Unity in Diversity, Strength in Solidarity
Speech 2-Unity in Diversity, Strength in SolidaritySpeech 2-Unity in Diversity, Strength in Solidarity
Speech 2-Unity in Diversity, Strength in Solidarity
Noraini Yunus
 
ICSE 2025 Keynote: Software Sustainability and its Engineering: How far have ...
ICSE 2025 Keynote: Software Sustainability and its Engineering: How far have ...ICSE 2025 Keynote: Software Sustainability and its Engineering: How far have ...
ICSE 2025 Keynote: Software Sustainability and its Engineering: How far have ...
patricialago3459
 
Bloom Where You Are Planted 05.04.2025.pptx
Bloom Where You Are Planted 05.04.2025.pptxBloom Where You Are Planted 05.04.2025.pptx
Bloom Where You Are Planted 05.04.2025.pptx
FamilyWorshipCenterD
 
Reflections on an ngo peace conference in zimbabwe
Reflections on an ngo peace conference in zimbabweReflections on an ngo peace conference in zimbabwe
Reflections on an ngo peace conference in zimbabwe
jujuaw05
 
fundamentals of communicationclass notes.pptx
fundamentals of communicationclass notes.pptxfundamentals of communicationclass notes.pptx
fundamentals of communicationclass notes.pptx
Sunkod
 
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
THE SEXUAL HARASSMENT OF WOMAN AT WORKPLACE (PREVENTION, PROHIBITION & REDRES...
ASHISHKUMAR504404
 
Ad

Security Basics in AWS or How To Get Rid of Hardcoded Credential and Reduce Data Leakage Risks with aws-vault

  • 1. Communit y AWS Community How To Get Rid of Hard-coded Credential and Reduce Data Leakage Risks with aws-vault Vladimir Cageyv Samoylov
  • 2. AWS Community Key Takeaway Understand how to minimize frictions on application development by using 3rd party tool, aws-vault, in your local development environment. Static IAM Access Keys should not be used in modern applications or/and on developers machines.
  • 3. AWS Community A common simple workflow Dev Stage Prod
  • 4. But, what happens before dev environment?
  • 7. But what if code depends on AWS Services?
  • 8. AWS Community Let’s ask search engine, GPT or Stack Overflow And the most popular answers will suggest you to go and create IAM User and STATIC Access Key :(
  • 12. “Only amateurs attack machines; professionals target people.” Bruce Schneier, American cryptographer, writer and computer security specialist
  • 13. aws-vault - A vault for securely storing and accessing AWS credentials in development environments
  • 14. AWS Community How it works and how aws-vault store creds AWS Vault stores IAM credentials in your operating system's secure keystore and then generates temporary credentials from those to expose to your shell and applications. It's designed to be complementary to the AWS CLI tools, and is aware of your profiles and configuration in ~/.aws/config. MacOS KeyChain Ubuntu Gnome Keyring Windows Credential Manager
  • 15. AWS Community AWS Security Token Service (AWS STS) AWS provides AWS Security Token Service (AWS STS) as a web service that enables you to request temporary, limited-privilege credentials for users Source: https://blog.knoldus.com/deep-dive-aws-temporary-security-credentials-assumerole-and-iam-role/
  • 16. AWS Community Top use cases with aws-vault in daily life - No more temporary keys inside ~/.aws/sso/cache - Login to AWS Console - Local runs with an without containers - Emulate ECS/EC2 - Unit tests with AWS Services and Localstack emulation - More use cases: https://github.com/99designs/aws-vault/blob/master/USAGE.md - aws-vault-examples: https://github.com/cageyv/aws-vault-examples
  • 17. Thank you Contacts: ● https://t.me/cageyv ● https://cageyv.dev/ ● https://github.com/cageyv/ ● https://www.linkedin.com/in/vladimirsamoylov / Useful links: ● https://github.com/99designs/aws-vault ● https://github.com/cageyv/aws-vault-examples ● https://docs.aws.amazon.com/cli/latest/usergui de/getting-started-install.html ● https://docs.aws.amazon.com/STS/latest/APIRe ference/welcome.html