<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Team on ferkakta.dev</title><link>https://ferkakta.dev/tags/team/</link><description>Recent content in Team on ferkakta.dev</description><generator>Hugo</generator><language>en-US</language><copyright>Copyright fizz.</copyright><lastBuildDate>Fri, 27 Feb 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://ferkakta.dev/tags/team/index.xml" rel="self" type="application/rss+xml"/><item><title>The IAM policy controls access — the document controls how people feel about it</title><link>https://ferkakta.dev/access-control-docs-as-respect/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate><guid>https://ferkakta.dev/access-control-docs-as-respect/</guid><description>&lt;p&gt;I tightened a teammate&amp;rsquo;s AWS permissions last night. Added an inline deny policy to block three categories of CloudWatch log groups — WorkSpaces OS logs, VPC flow logs, WAF request data. Five minutes of IAM work. Then I spent twenty minutes writing a document explaining every boundary, what&amp;rsquo;s accessible, what&amp;rsquo;s denied, what&amp;rsquo;s coming next, and what I haven&amp;rsquo;t designed yet.&lt;/p&gt;
&lt;p&gt;The document mattered more than the policy.&lt;/p&gt;
&lt;h2 id="the-default-is-silence"&gt;The default is silence&lt;/h2&gt;
&lt;p&gt;Most companies handle access control the same way. Someone asks for access. An admin creates a policy. The requester gets a login link. Nobody explains what they can and can&amp;rsquo;t do, or why.&lt;/p&gt;</description></item></channel></rss>