官术网_书友最值得收藏!

  • Mastering AWS Security
  • Albert Anthony
  • 352字
  • 2021-07-02 15:44:12

Chapter overview

In this chapter, we are going to learn about AWS IAM. We will go through various IAM tools and features and their use cases and look at ways in which we can access IAM. We will deep dive into IAM authentication and authorization. Authentication includes identities such as users, roles, and groups, and authorization talks about access management, permissions, and policies for AWS resources. We'll walk through the benefits of IAM and how it can help us secure our AWS resources. Finally, we'll take a look at IAM best practices.

The following is a snapshot of what we'll cover in this chapter:

  • IAM features and tools
  • IAM authentication
  • IAM authorization
  • AWS credentials
  • IAM limitations
  • IAM best practices

This chapter will help us understand user authentication and access control in detail. Essentially, IAM is our first step towards securing our AWS resources. All of us who have used a laptop or a mobile phone understand that access control plays a vital part in securing our resources. So, if a person gets hold of your credentials, it will be disastrous from the point of view of data security. Ensuring your credentials are secure, having trusted entities interacting with your AWS resources, and having stringent controls as well as greater flexibility allows you to support multiple use cases with a wide variety of AWS resources.

Along with learning about all available IAM features, we will also learn how to create, monitor, and manage various identities, their credentials, and policies. Additionally, we'll look at Multi-Factor Authentication (MFA), Secure Token Service (STS), and tools such as IAM policy simulator.

Following on, we'll deep dive into identities and policies. We'll learn what tools and features are available in AWS IAM to support a myriad of use cases for allowing access and performing actions on AWS resources. We will go through the various credentials that AWS provides and how to manage them.

We'll go through IAM limitations for various entities and objects. Lastly, we'll take a look at IAM best practices that are recommended to ensure that all your resources can be accessed in a secure manner.

主站蜘蛛池模板: 隆安县| 庄河市| 黔南| 安多县| 临清市| 布尔津县| 理塘县| 泾川县| 浠水县| 收藏| 双峰县| 塔城市| 阿拉善右旗| 巴里| 长葛市| 大理市| 揭东县| 靖西县| 巩义市| 建昌县| 拉孜县| 双流县| 宁化县| 定安县| 工布江达县| 肥西县| 兴城市| 湟中县| 云安县| 锡林郭勒盟| 谢通门县| 玛沁县| 青冈县| 三明市| 茶陵县| 樟树市| 荃湾区| 工布江达县| 宜章县| 台北县| 柘城县|