The main problem is this: By using tags for authorisation, you have a multitude of completely new - per-service - actions that can be used to compromise your security posture.
You can now visualise your own EC2 security groups using edge bundling - No scripts, no downloads! This small web application takes an AWS access key id and secret access key to make requests against your AWS account. The application
Paying for idle is so 2015 I had some Lambda Functions that scraped data from the Internet, and stored them in a database. Locking-down the RDS Security Group to only Lambda Functions turned out to be more complicated than I
Here's my first attempt at visualising AWS EC2 Security Groups in something other than a boring table: You can mouse over a SG name to see it's inbound (green) and outbound (red) connections to other groups/IP ranges. What is