尊敬的 微信汇率:1円 ≈ 0.046239 元 支付宝汇率:1円 ≈ 0.04633元 [退出登录]
SlideShare a Scribd company logo
Identity Access Management
Agenda
● Introduction to IAM
● IAM Concepts
● Key IAM Features
● IAM Best Practices
Introduction
AWS Identity and Access Management (IAM) is a web service that helps you
securely control access to AWS resources. With IAM, you can centrally manage
permissions that control which AWS resources users can access. You use IAM to
control who is authenticated (signed in) and authorized (has permissions) to use
resources.
IAM Concept
Key IAM Features
● Users
● Groups
● Policies
● Roles
Users
● An IAM user is an identity with an associated credential and permissions attached
to it.
● This could be an actual person who is a user, or it could be an application that is a
user.
● With IAM, you can securely manage access to AWS services by creating an IAM
user name for each employee in your organization.
● Each IAM user is associated with only one AWS account.
● By default, a newly created user is not authorized to perform any action in AWS.
● The advantage of having one-to-one user specification is that you can individually
assign permissions to each user.
Group
● A collection of IAM users is an IAM group.
● You can use IAM groups to specify permissions for multiple users so that any
permissions applied to the group are applied to the individual users in that
group as well.
● You set permissions for the group, and those permissions are automatically
applied to all the users in the group.
● If you add another user to the group, the new user will automatically inherit all
the policies and the permissions already assigned to that group.
Policies
● An IAM policy sets permission and controls access to AWS resources.
● Policies are stored in AWS as JSON documents.
● Permissions specify who has access to the resources and what actions they
can perform.
Policy: AmazonS3ReadOnlyAccess
{
"Version": "2012-10-17", == This indicates the version of the policy language being used
"Statement": [ == This is an array of statements that define the permissions granted by the policy.
{
"Effect": "Allow", == This is the effect of the statement, which is set to "Allow." It means that this policy allows the
specified actions on the specified resources.
"Action": [ This is an array of actions that this policy allows.
"s3:Get*",
"s3:List*",
"s3:Describe*",
"s3-object-lambda:Get*",
"s3-object-lambda:List*"
],
"Resource": "*" == The asterisk (*) is a wildcard, meaning that this policy allows the specified actions on all S3
}
]
}
Roles
● An IAM role is a set of permissions that define what actions are allowed and
denied by an entity in the AWS console.
● It is similar to a user in that it can be accessed by any type of entity (an
individual or AWS service). Role permissions are temporary credentials.
IAM Best Practices
● Monitor and log IAM activity.
● Use IAM Access Analyzer.
● Implement strong password policies.
● Follow the principle of separation of duties.
● Establish a strong naming convention.
● Leverage IAM policy summaries.
● Stay informed about AWS security features and updates.

More Related Content

Similar to Identity Access Management presented by Techserverglobal

AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users
StephenEfange3
 
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction
Amazon Web Services
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
Amazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
Amazon Web Services
 
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel AvivIAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
Amazon Web Services
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
Crishantha Nanayakkara
 
Controlling Access to your Resources
Controlling Access to your ResourcesControlling Access to your Resources
Controlling Access to your Resources
Amazon Web Services
 
(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By
Amazon Web Services
 
Security Day IAM Recommended Practices
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended Practices
Amazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
Amazon Web Services
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
Amazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
Amazon Web Services
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Amazon Web Services
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Amazon Web Services
 
Iam presentation
Iam presentationIam presentation
Iam presentation
AWS UG PK
 
AWSM2C3.pptx
AWSM2C3.pptxAWSM2C3.pptx
AWSM2C3.pptx
RahulDange13
 
AWS Identity and access Managment
AWS Identity and access ManagmentAWS Identity and access Managment
AWS Identity and access Managment
Mahesh Raj
 
Aws iam best practices to live by
Aws iam best practices to live byAws iam best practices to live by
Aws iam best practices to live by
John Varghese
 
Becoming an IAM Policy Ninja
Becoming an IAM Policy NinjaBecoming an IAM Policy Ninja
Becoming an IAM Policy Ninja
Amazon Web Services
 

Similar to Identity Access Management presented by Techserverglobal (20)

AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users
 
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel AvivIAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
 
Controlling Access to your Resources
Controlling Access to your ResourcesControlling Access to your Resources
Controlling Access to your Resources
 
(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By
 
Security Day IAM Recommended Practices
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended Practices
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 
AWSM2C3.pptx
AWSM2C3.pptxAWSM2C3.pptx
AWSM2C3.pptx
 
AWS Identity and access Managment
AWS Identity and access ManagmentAWS Identity and access Managment
AWS Identity and access Managment
 
Aws iam best practices to live by
Aws iam best practices to live byAws iam best practices to live by
Aws iam best practices to live by
 
Becoming an IAM Policy Ninja
Becoming an IAM Policy NinjaBecoming an IAM Policy Ninja
Becoming an IAM Policy Ninja
 

More from HarpalGohil4

8. Azure Storage present by Techserverglobal
8. Azure Storage present by Techserverglobal8. Azure Storage present by Techserverglobal
8. Azure Storage present by Techserverglobal
HarpalGohil4
 
6.Application Gateway by Techserverglobal
6.Application Gateway by Techserverglobal6.Application Gateway by Techserverglobal
6.Application Gateway by Techserverglobal
HarpalGohil4
 
7. Azure Virtual Machine Scale-Set by Techserverglobal
7. Azure Virtual Machine Scale-Set by Techserverglobal7. Azure Virtual Machine Scale-Set by Techserverglobal
7. Azure Virtual Machine Scale-Set by Techserverglobal
HarpalGohil4
 
5. Azure Load Balancer Presented by Techservergloabal
5. Azure Load Balancer Presented by Techservergloabal5. Azure Load Balancer Presented by Techservergloabal
5. Azure Load Balancer Presented by Techservergloabal
HarpalGohil4
 
Introduction to EC2 [Elastic Compute Cloud]
Introduction to EC2 [Elastic Compute Cloud]Introduction to EC2 [Elastic Compute Cloud]
Introduction to EC2 [Elastic Compute Cloud]
HarpalGohil4
 
Amazon Virtual Private Cloud Presented by Techserverglobal
Amazon Virtual Private Cloud Presented by TechserverglobalAmazon Virtual Private Cloud Presented by Techserverglobal
Amazon Virtual Private Cloud Presented by Techserverglobal
HarpalGohil4
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
AWS Codepipeline presented by Techserverglobal
AWS Codepipeline presented by TechserverglobalAWS Codepipeline presented by Techserverglobal
AWS Codepipeline presented by Techserverglobal
HarpalGohil4
 
Amazon ECS presented by Techserverglobal
Amazon ECS presented by TechserverglobalAmazon ECS presented by Techserverglobal
Amazon ECS presented by Techserverglobal
HarpalGohil4
 
AWS CodeBuild presented by Techserverglobal
AWS CodeBuild presented by TechserverglobalAWS CodeBuild presented by Techserverglobal
AWS CodeBuild presented by Techserverglobal
HarpalGohil4
 
AWS Codecommit presented by Techserverglobal
AWS Codecommit presented by TechserverglobalAWS Codecommit presented by Techserverglobal
AWS Codecommit presented by Techserverglobal
HarpalGohil4
 
4. Azure Administration by Techserverglobal
4. Azure Administration by Techserverglobal4. Azure Administration by Techserverglobal
4. Azure Administration by Techserverglobal
HarpalGohil4
 
3. Azure Virtual Machine Extension by Techserverglobal
3. Azure Virtual Machine Extension by Techserverglobal3. Azure Virtual Machine Extension by Techserverglobal
3. Azure Virtual Machine Extension by Techserverglobal
HarpalGohil4
 
2. Virtual Machine Overview present by techserverglobal
2. Virtual Machine Overview present by techserverglobal2. Virtual Machine Overview present by techserverglobal
2. Virtual Machine Overview present by techserverglobal
HarpalGohil4
 
1.Azure IntroductionPresent by Techserverglobal
1.Azure IntroductionPresent by Techserverglobal1.Azure IntroductionPresent by Techserverglobal
1.Azure IntroductionPresent by Techserverglobal
HarpalGohil4
 
DevOps.pptx
DevOps.pptxDevOps.pptx
DevOps.pptx
HarpalGohil4
 

More from HarpalGohil4 (16)

8. Azure Storage present by Techserverglobal
8. Azure Storage present by Techserverglobal8. Azure Storage present by Techserverglobal
8. Azure Storage present by Techserverglobal
 
6.Application Gateway by Techserverglobal
6.Application Gateway by Techserverglobal6.Application Gateway by Techserverglobal
6.Application Gateway by Techserverglobal
 
7. Azure Virtual Machine Scale-Set by Techserverglobal
7. Azure Virtual Machine Scale-Set by Techserverglobal7. Azure Virtual Machine Scale-Set by Techserverglobal
7. Azure Virtual Machine Scale-Set by Techserverglobal
 
5. Azure Load Balancer Presented by Techservergloabal
5. Azure Load Balancer Presented by Techservergloabal5. Azure Load Balancer Presented by Techservergloabal
5. Azure Load Balancer Presented by Techservergloabal
 
Introduction to EC2 [Elastic Compute Cloud]
Introduction to EC2 [Elastic Compute Cloud]Introduction to EC2 [Elastic Compute Cloud]
Introduction to EC2 [Elastic Compute Cloud]
 
Amazon Virtual Private Cloud Presented by Techserverglobal
Amazon Virtual Private Cloud Presented by TechserverglobalAmazon Virtual Private Cloud Presented by Techserverglobal
Amazon Virtual Private Cloud Presented by Techserverglobal
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
AWS Codepipeline presented by Techserverglobal
AWS Codepipeline presented by TechserverglobalAWS Codepipeline presented by Techserverglobal
AWS Codepipeline presented by Techserverglobal
 
Amazon ECS presented by Techserverglobal
Amazon ECS presented by TechserverglobalAmazon ECS presented by Techserverglobal
Amazon ECS presented by Techserverglobal
 
AWS CodeBuild presented by Techserverglobal
AWS CodeBuild presented by TechserverglobalAWS CodeBuild presented by Techserverglobal
AWS CodeBuild presented by Techserverglobal
 
AWS Codecommit presented by Techserverglobal
AWS Codecommit presented by TechserverglobalAWS Codecommit presented by Techserverglobal
AWS Codecommit presented by Techserverglobal
 
4. Azure Administration by Techserverglobal
4. Azure Administration by Techserverglobal4. Azure Administration by Techserverglobal
4. Azure Administration by Techserverglobal
 
3. Azure Virtual Machine Extension by Techserverglobal
3. Azure Virtual Machine Extension by Techserverglobal3. Azure Virtual Machine Extension by Techserverglobal
3. Azure Virtual Machine Extension by Techserverglobal
 
2. Virtual Machine Overview present by techserverglobal
2. Virtual Machine Overview present by techserverglobal2. Virtual Machine Overview present by techserverglobal
2. Virtual Machine Overview present by techserverglobal
 
1.Azure IntroductionPresent by Techserverglobal
1.Azure IntroductionPresent by Techserverglobal1.Azure IntroductionPresent by Techserverglobal
1.Azure IntroductionPresent by Techserverglobal
 
DevOps.pptx
DevOps.pptxDevOps.pptx
DevOps.pptx
 

Recently uploaded

inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Tracking Millions of Heartbeats on Zee's OTT Platform
Tracking Millions of Heartbeats on Zee's OTT PlatformTracking Millions of Heartbeats on Zee's OTT Platform
Tracking Millions of Heartbeats on Zee's OTT Platform
ScyllaDB
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Cost-Efficient Stream Processing with RisingWave and ScyllaDB
Cost-Efficient Stream Processing with RisingWave and ScyllaDBCost-Efficient Stream Processing with RisingWave and ScyllaDB
Cost-Efficient Stream Processing with RisingWave and ScyllaDB
ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes GlobalScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 

Recently uploaded (20)

inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Tracking Millions of Heartbeats on Zee's OTT Platform
Tracking Millions of Heartbeats on Zee's OTT PlatformTracking Millions of Heartbeats on Zee's OTT Platform
Tracking Millions of Heartbeats on Zee's OTT Platform
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Cost-Efficient Stream Processing with RisingWave and ScyllaDB
Cost-Efficient Stream Processing with RisingWave and ScyllaDBCost-Efficient Stream Processing with RisingWave and ScyllaDB
Cost-Efficient Stream Processing with RisingWave and ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes GlobalScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes Global
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 

Identity Access Management presented by Techserverglobal

  • 2. Agenda ● Introduction to IAM ● IAM Concepts ● Key IAM Features ● IAM Best Practices
  • 3. Introduction AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. With IAM, you can centrally manage permissions that control which AWS resources users can access. You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources.
  • 5. Key IAM Features ● Users ● Groups ● Policies ● Roles
  • 6. Users ● An IAM user is an identity with an associated credential and permissions attached to it. ● This could be an actual person who is a user, or it could be an application that is a user. ● With IAM, you can securely manage access to AWS services by creating an IAM user name for each employee in your organization. ● Each IAM user is associated with only one AWS account. ● By default, a newly created user is not authorized to perform any action in AWS. ● The advantage of having one-to-one user specification is that you can individually assign permissions to each user.
  • 7. Group ● A collection of IAM users is an IAM group. ● You can use IAM groups to specify permissions for multiple users so that any permissions applied to the group are applied to the individual users in that group as well. ● You set permissions for the group, and those permissions are automatically applied to all the users in the group. ● If you add another user to the group, the new user will automatically inherit all the policies and the permissions already assigned to that group.
  • 8. Policies ● An IAM policy sets permission and controls access to AWS resources. ● Policies are stored in AWS as JSON documents. ● Permissions specify who has access to the resources and what actions they can perform.
  • 9.
  • 10. Policy: AmazonS3ReadOnlyAccess { "Version": "2012-10-17", == This indicates the version of the policy language being used "Statement": [ == This is an array of statements that define the permissions granted by the policy. { "Effect": "Allow", == This is the effect of the statement, which is set to "Allow." It means that this policy allows the specified actions on the specified resources. "Action": [ This is an array of actions that this policy allows. "s3:Get*", "s3:List*", "s3:Describe*", "s3-object-lambda:Get*", "s3-object-lambda:List*" ], "Resource": "*" == The asterisk (*) is a wildcard, meaning that this policy allows the specified actions on all S3 } ] }
  • 11. Roles ● An IAM role is a set of permissions that define what actions are allowed and denied by an entity in the AWS console. ● It is similar to a user in that it can be accessed by any type of entity (an individual or AWS service). Role permissions are temporary credentials.
  • 12.
  • 13. IAM Best Practices ● Monitor and log IAM activity. ● Use IAM Access Analyzer. ● Implement strong password policies. ● Follow the principle of separation of duties. ● Establish a strong naming convention. ● Leverage IAM policy summaries. ● Stay informed about AWS security features and updates.
  翻译: