Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For that matter, using an access-key or secret-key at all is basically an anti-pattern now.

In the past few months AWS has added to their UI a popup box that asks you why you are creating access keys, it makes you answer it before generating the keys. Once you give it the answer it tells you better ways to do almost anything you're trying to do, and you have to agree to ignore those suggestions one more time before actually generating the keys.

Basically the standard access keys are really of no use anymore. You should be using roles, OIDC, IAM Identity Center, cognito federated identities, or something else. There are a million ways to identify yourself that are more secure than that and I wish tutorials stopped assuming that you should generate access keys because in no practical 2023 use case should you be doing that anymore. Especially not in any sort of sensitive or corporate environment.



It’s still the fastest and most common way to get aws cli working on a local dev machine.


If you’re part of any decently large organization, you’re probably using Control Tower or another solution that lets you create temporary credentials easily.


I really do appreciate the effort they’ve gone through there though - they didn’t have to.


I think they do. Given the damage that leaked keys can do (especially in the Bitcoin mining area) it must be an expensive problem for them.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: