Boto3: AWS Resources & Authentication & Authorization ๐Ÿ”‘

Boto3: AWS Resources & Authentication & Authorization ๐Ÿ”‘


3 min read


As a DevOps & Site Reliability Engineer (SRE), Boto3 is your secret weapon for managing AWS resources efficiently and ensuring robust authentication and authorization. In this guide, we'll dive into creating, managing, and deleting AWS resources, listing and describing them, and expertly handling authentication and authorization using IAM roles and policies with Boto3. ๐Ÿš€

Working with AWS Resources ๐Ÿ—๏ธ

Creating, Managing, and Deleting AWS Resources ๐Ÿ’ก

Boto3 empowers you to automate the provisioning and management of AWS resources. Let's go through some common operations:

Creating AWS Resources:

import boto3

ec2 = boto3.resource('ec2')
ec2.create_instances(ImageId='ami-12345678', MinCount=1, MaxCount=5)

This code creates EC2 instances with a specified Amazon Machine Image (AMI).

Managing AWS Resources:

# Modifying an S3 bucket's access control
s3 = boto3.client('s3')
s3.put_bucket_acl(Bucket='mybucket', ACL='public-read')

# Changing the size of an RDS instance
rds = boto3.client('rds')
rds.modify_db_instance(DBInstanceIdentifier='mydb', AllocatedStorage=100)

With Boto3, you can manage resources like S3 buckets and RDS instances effortlessly.

Deleting AWS Resources:

# Terminating an EC2 instance
ec2 = boto3.client('ec2')

This code terminates a specific EC2 instance.

Listing and Describing AWS Resources ๐Ÿ“‹

Boto3 makes it simple to retrieve information about your AWS resources. For instance, listing EC2 instances:

ec2 = boto3.client('ec2')
response = ec2.describe_instances()
instances = response['Reservations']

By calling describe_instances, you get a detailed description of your instances.

Authentication and Authorization ๐Ÿ”

Managing IAM Roles and Policies ๐Ÿ›ก๏ธ

Creating an IAM Role with Boto3:

import boto3

iam = boto3.client('iam')
        'Version': '2012-10-17',
        'Statement': [{
            'Effect': 'Allow',
            'Principal': {'Service': ''},
            'Action': 'sts:AssumeRole'

This code creates an IAM role named 'MyRole' that can be assumed by AWS Lambda.

Creating an IAM Policy with Boto3:

        'Version': '2012-10-17',
        'Statement': [{
            'Effect': 'Allow',
            'Action': 's3:ListBucket',
            'Resource': 'arn:aws:s3:::mybucket'

This code creates a policy named 'MyPolicy' allowing listing of objects in an S3 bucket.

Using IAM Roles and Permissions with Boto3 ๐Ÿ’ช

Once you've created IAM roles and policies, you can use them in your code:

import boto3
from botocore.exceptions import NoCredentialsError

    # Assuming a role
    sts = boto3.client('sts')
    assumed_role = sts.assume_role(

    # Using assumed role credentials
    s3 = boto3.client('s3',

except NoCredentialsError:
    print("No AWS credentials found.")

Here, we assume the 'MyRole' IAM role and then use its temporary credentials to access S3.

In conclusion, Boto3 equips you with the tools to efficiently manage AWS resources and implement robust authentication and authorization mechanisms with IAM roles and policies. Embrace these capabilities to supercharge your SRE tasks and ensure the reliability of your AWS infrastructure. ๐Ÿ’ช๐Ÿ”

Happy automating, and may your AWS resources always be well-managed and secure! ๐Ÿ›ก๏ธ๐Ÿš€

Did you find this article valuable?

Support Prasad Suman Mohan by becoming a sponsor. Any amount is appreciated!