Organizations adopting cloud and CI/CD pipelines need to secure AWS credentials effectively. Traditionally, long-term AWS access keys were used in CI configurations, posing security risks. A preferred approach leverages short-term AWS credentials for improved security. This method involves setting up an AWS IAM OpenID Connect provider, defining an IAM policy for assuming roles, and configuring GitHub Actions to use short-term credentials. The process includes creating an AWS IAM OpenID Connect provider to authenticate with AWS using an external identity provider like GitHub. An IAM policy is then defined to grant permission for assuming roles. Finally, GitHub Actions are configured to obtain short-term AWS credentials using the aws-actions/configure-aws-credentials@v2 action. This approach enhances security by reducing the window of opportunity for unauthorized access and minimizing the risk of credential exposure.