Introduction
Introduction to security configuration
AWS named profile for chaos
Manage different users to perform AWS API calls
Policy for all AWS faults
AWS superset policy to execute all AWS faults
Use IAM roles for authentication
Authentication methods