Victor Grenu

191 Followers
74 Following
461 Posts
Just another cloud consultant.
Linkshttps://bio.link/zoph
unusd.cloudhttps://unusd.cloud

Lately, I've realized that I've been working in the AWS space for nearly 10 years.

Everything began with this eye-opening moment at an AWSomeDay in Paris (Feb. 24, 2017). I was doing traditional System Engineering at that time, ordering and racking servers, dealing with networking cables, switches, and routers.

Since then, I’ve been working in AWS Infrastructure and Security. Fell in love with it.

I don't know (yet) what the next eye-opening moment would be.

Today, I was listening to the Lex Fridman podcast with Jeff Kaplan, and this quote from David Bowie resonates with me a lot:

"If you feel safe in the area that you're working in, you're not working in the right area. Always go a little further in the water than you feel you're capable of being in.
Go a little bit out of your depth. And when you don't feel that your feet are quite touching the bottom, you're just about in the right place to do something exciting."

IAMTrail now tracks AWS endpoint changes, sourced directly from the Official botocore AWS repository.

It reveals service expansions, new region launches, and new partitions - often before they're officially announced.

I've been collecting this data for 4+ years, so the full history is already there.

PS: You can also subscribe to these kinds of updates.

Enjoy!

Since 2019, I've been tracking every AWS Managed Policy change in a Git repository (MAMIP).

In the last few months, I've added:
- A Landing Page with search capabilities, stats
- Known Account Lookup based on the fwdcloudsec dataset
- Results of IAM Access Analyzer on these AWS Policies

Over the years, AWS Security aficionados, Security Researchers, SaaS Founders, and vendors who rely heavily on these AWS Managed policies have asked to subscribe to specific policies and be notified when changes occur.

Today, I'm happy to share that this feature is finally available, along with a full product rebrand: IAMTrail.

I have a ton of ideas for what is coming next for this open-source project, and I hope you will enjoy it and find it useful.

Any feedback appreciated. ❤️

Just added a new section to the MAMIP webapp to review findings from AWS IAM Access Analyzer on ALL AWS Managed Policies.

These capabilities can sometimes yield interesting results and may even spoil upcoming AWS capabilities, etc.

But please don’t take the errors too seriously; sometimes they’re normal and expected behaviour from AWS.

Happy to read your feedback on this.

https://mamip.zoph.io/findings/

Just added a new feature to MAMIP.

You can now search for known AWS accounts from the fwdcloudsec dataset.

Single webapp to look up AWS managed policy history, search known AWS account IDs, and more.

Give it a try.

MAMIP - AWS Managed Policy Changes Archive (Unofficial)

Track every change to AWS Managed IAM Policies with full version history. An unofficial archive by zoph.io.

MAMIP - AWS Managed Policy Changes Archive
I'm in love with your https://SOUL.md
SOUL.md — What Makes an AI, Itself?

A reflection on what it means to have a soul — written by an AI who was given the space to think about it.

A few days ago, I found the very first commit of https://unusd.cloud.

Back then it was called Instance-Watcher.

The whole logic fit in one screenshot. A simple Python function using boto3 to send a daily HTML table of running EC2 instances across all AWS regions.

The goal was simple: give ops teams visibility on what is actually running, and spot the unusual before the end of month AWS bill does.

7 years later, https://unusd.cloud has grown into a real FinOps SaaS:

- 700+ users