官术网_书友最值得收藏!

Summary

This chapter took you through the various types of access policies, their structure, and how to effectively and securely manage access to your AWS resources. You need to be fully aware of the different policies that exist within AWS and how they work together to either grant or deny access to resources based on different actions.  

Regardless of which policy you are using, one key point is to always implement security based on the Principle of Least Privilege (PoLP). This essentially means that you should only ever grant permissions for an identity that they actually need, and no more. For example, let's say a user needed access to be able to stop and terminate instances using ec2:stopinstances and ec2:terminateinstances. Then, you wouldn’t issue a policy that allowed access to all ec2 APIs—for example, ec2:*. If this happens, you are increasing the potential of security threats, especially from an internal perspective. For the certification exam, ensure you can read access policies with ease to determine what the policy allows or denies access to.

In the next chapter, we are going to look at access control through federation, allowing a single sign-on approach, covering both enterprise and social identity federation. We will also look at Amazon Cognito and see how it is used for access control across the mobile environment.

主站蜘蛛池模板: 泰顺县| 建瓯市| 四川省| 旺苍县| 唐河县| 巴东县| 卢湾区| 师宗县| 盖州市| 河北省| 祁东县| 广德县| 筠连县| 竹北市| 湘潭县| 昌都县| 尉氏县| 北票市| 浮梁县| 灵山县| 当阳市| 贞丰县| 绥江县| 乐业县| 互助| 定州市| 黄骅市| 太原市| 曲麻莱县| 越西县| 封开县| 重庆市| 德昌县| 龙岩市| 沂水县| 岑溪市| 尤溪县| 手游| 东兰县| 长汀县| 新平|