- AWS Certified Security:Specialty Exam Guide
- Stuart Scott
- 226字
- 2021-06-11 18:13:19
Summary
This chapter took you through the various types of access policies, their structure, and how to effectively and securely manage access to your AWS resources. You need to be fully aware of the different policies that exist within AWS and how they work together to either grant or deny access to resources based on different actions.
Regardless of which policy you are using, one key point is to always implement security based on the Principle of Least Privilege (PoLP). This essentially means that you should only ever grant permissions for an identity that they actually need, and no more. For example, let's say a user needed access to be able to stop and terminate instances using ec2:stopinstances and ec2:terminateinstances. Then, you wouldn’t issue a policy that allowed access to all ec2 APIs—for example, ec2:*. If this happens, you are increasing the potential of security threats, especially from an internal perspective. For the certification exam, ensure you can read access policies with ease to determine what the policy allows or denies access to.
In the next chapter, we are going to look at access control through federation, allowing a single sign-on approach, covering both enterprise and social identity federation. We will also look at Amazon Cognito and see how it is used for access control across the mobile environment.
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- CSO進階之路:從安全工程師到首席安全官
- 網(wǎng)絡安全保障能力研究
- Preventing Digital Extortion
- 代碼審計:企業(yè)級Web代碼安全架構(gòu)
- 諸神之眼:Nmap網(wǎng)絡安全審計技術(shù)揭秘
- 網(wǎng)絡安全三十六計:人人該懂的防黑客技巧
- Kali Linux Network Scanning Cookbook(Second Edition)
- Testing and Securing Android Studio Applications
- API安全技術(shù)與實戰(zhàn)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實踐
- Mastering Reverse Engineering
- 華為防火墻實戰(zhàn)指南
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 復雜信息系統(tǒng)網(wǎng)絡安全體系建設(shè)指南