How I Stopped Worrying and Learned to Give Myself Any AWS Permissions I Wanted

I'm happy to have some ideas worth blogging about at last!  Here's a really big one I stumbled across if you're in an organization that wants to keep permissions relatively locked down on AWS (in terms of performing actions on resources), but still wants to enable individual users the ability to interact with their own stacks as needed without waiting on admins. The TL/DR Of It Using AWS CloudFormation, you can deploy a stack consisting of a single resource.  This resource is of type AWS::IAM::ManagedPolicy .  Attach all the policy statements you want, then add Users consisting of any IAM users on the AWS account.  Voila, instant permissions to do whatever. More About the Process Let's say you need to tweak various aspects of your AWS setup.  Maybe you have a DynamoDB entry that needs to be manually tweaked, a Lambda function where the concurrency needs to be adjusted, an SQS queue where the maximum age of a message needs to be adjusted, or files sitting around in an S

I/O 2021: New Decade, New Frontiers

 Did you miss any content from Google I/O 2021? If so, then check out the links below to see the sites and videos linked to throughout the entire map above.  (If you missed the roundtables or Meetups hosted on Bevy, then sorry, I think you're out of luck; those are lost to the ether.) But First, a Recap: 2021 is the first year of Google I/O since 2019, since 2020's I/O was scheduled to happen in the midst of many worldwide lockdowns from the COVID-19 pandemic.  While I'm sure much content was being prepared for 2020, it would take a great deal of logistical shifts to prepare all of it to be delivered virtually.  But it was certainly worth the wait! As you can see from above, besides the usual lists of conference talks and meetups, there was also Google I/O Adventure , an explorable "platformer" where you could wander the map, collect wearables and badges, and meet other I/O attendees and Googlers.  Obviously a lot of thought and creativity went into this, and whil