官术网_书友最值得收藏!

  • Mastering AWS Security
  • Albert Anthony
  • 352字
  • 2021-07-02 15:44:12

Chapter overview

In this chapter, we are going to learn about AWS IAM. We will go through various IAM tools and features and their use cases and look at ways in which we can access IAM. We will deep dive into IAM authentication and authorization. Authentication includes identities such as users, roles, and groups, and authorization talks about access management, permissions, and policies for AWS resources. We'll walk through the benefits of IAM and how it can help us secure our AWS resources. Finally, we'll take a look at IAM best practices.

The following is a snapshot of what we'll cover in this chapter:

  • IAM features and tools
  • IAM authentication
  • IAM authorization
  • AWS credentials
  • IAM limitations
  • IAM best practices

This chapter will help us understand user authentication and access control in detail. Essentially, IAM is our first step towards securing our AWS resources. All of us who have used a laptop or a mobile phone understand that access control plays a vital part in securing our resources. So, if a person gets hold of your credentials, it will be disastrous from the point of view of data security. Ensuring your credentials are secure, having trusted entities interacting with your AWS resources, and having stringent controls as well as greater flexibility allows you to support multiple use cases with a wide variety of AWS resources.

Along with learning about all available IAM features, we will also learn how to create, monitor, and manage various identities, their credentials, and policies. Additionally, we'll look at Multi-Factor Authentication (MFA), Secure Token Service (STS), and tools such as IAM policy simulator.

Following on, we'll deep dive into identities and policies. We'll learn what tools and features are available in AWS IAM to support a myriad of use cases for allowing access and performing actions on AWS resources. We will go through the various credentials that AWS provides and how to manage them.

We'll go through IAM limitations for various entities and objects. Lastly, we'll take a look at IAM best practices that are recommended to ensure that all your resources can be accessed in a secure manner.

主站蜘蛛池模板: 两当县| 龙江县| 西畴县| 霍城县| 萨迦县| 区。| 太白县| 盐津县| 新邵县| 合阳县| 曲靖市| 固始县| 梨树县| 和田市| 汨罗市| 辉南县| 南岸区| 承德县| 来宾市| 中牟县| 古丈县| 邯郸县| 临潭县| 颍上县| 南木林县| 苏尼特左旗| 墨江| 华宁县| 安平县| 仙桃市| 开鲁县| 泸州市| 峨山| 嘉祥县| 孝昌县| 郁南县| 峨边| 酒泉市| 平昌县| 阿拉善左旗| 和龙市|