How IAM works??
Rashmi Chawla
AWS Restart Graduate and certified Cloud Practitioner, 'AWS Career Growth Program'
What is IAM?
IAM is a crucial aspect of cloud security. All kinds of businesses require a secure environment across their application life cycle. AWS delivers a great baseline for implementing a least privileged approach to permissions.
?
Identity and Access Management
Identity and access management is a key component of any security architecture. It is a framework that ensures the right people can access the right resources or services securely. It’s all about identifying the user and giving the user access to the resources.
How IAM works?
Before we create users we need to understand how IAM works. IAM is a global service and provides the necessary infrastructure that can centrally manage the following elements
·???????Identification- Identifying the user
AWS Identity and Access Management (IAM) enables AWS customers to manage users and user permissions. AWS has some specific components of its IAM systems. AWS uses the concept of principals
Principals
In AWS, a principal is an IAM entity (who takes the action) that is permitted to access AWS resources. AWS further breaks down the principal concept into root users, IAM users, and roles.
?
In the AWS environment, there are 3 types of users.
Root user
The root user is the owner of the account (the person who created the AWS account).
IAM USER
IAM group
?
IAM Roles·???????In AWS we create IAM roles to delegate access
?
Example: roles are used to grant permissions to applications running on an instance that need to use a bucket in Amazon s3. For this kind of scenario, you need to attach permission for IAM roles by creating a policy in JSON format.
There are 4 types of IAM roles
A service role is basically a role that any AWS service assumes in your account on your behalf
IAM role is used by an AWS service to access another service,
Here are some important features of IAM
Policy
领英推荐
AWS supports 3 types of policies·????????Managed policies.
Managed Policy:
Customer Managed Policy:
Standalone Policy that you create and administer in your own AWS account. (Standalone policy means that the policy has its own Amazon Resource Name (ARN) that includes the policy name).
AWS-managed policies are designed to provide permissions for many common use cases
?
Inline Policy:
Identity-based policies – You can attach managed and inline policies to IAM identities (users, groups, and roles).
Resource-based policies?– Resource-based policies grant permissions to the resource (account, user, role, or federated user) specified as the principal.
IAM permissions boundaries?– Permissions boundaries are used to define the maximum permission that an entity can have.
AWS Organizations service control policies (SCPs)?– Organizations SCPs specifies the maximum permissions for an organization or organizational unit (OU).
Session policies – Session policies are advanced policies that you pass as parameters when you programmatically create a temporary session for a role of a federated user.
?
AWS Security Token Service
The AWS Security Token Service (STS) is a web service that enables you to request temporary, limited-privilege credentials for IAM users or for users that you authenticate (federated users).
By default, it is a global service, and all AWS STS requests go to a single endpoint
You can send your AWS STS requests to endpoints in any region which helps to reduce latency.
There are a couple of ways STS can be used.
Scenario 1:
Scenario 2:
To make a request in a different account the resource in that account must have an attached resource-based policy with the permissions you need.
Or you must assume a role (identity-based policy) within that account with the permissions you need.
?
IAM Best Practices
To secure AWS resources, it is recommended that you follow these best practices:
Conclusion
Security is everything for any kind of business, whether you need to deploy a cloud or an On-premises solution, AWS helps you establish trust, protects against vulnerabilities, and delivers secure access to your resources. AWS IAM protects against outside and inside threats and provides security without affecting efficiency. A cloud provider like AWS helps customers to solve security problems with tools like AWS access analyzer, which analyze and recommend best practices.
Pravin Mishra My website Shefali Arora Bhavesh Atara Satish Pandey Ruchita Tandon Thank you so much all for your constant support and guidance
AWS/Azure - Lead Engineer/Architect | Cloud Freelance Consultant | AWS Authorized Instructor | Author of the THREE books Cloud Computing with AWS, Mastering AWS DevOps & Git and GitHub for Modern Software Development
2 年???????????????? This is the great blog Rashmi Chawla. Well explained.
AWS Community Builder | AWS Lead Instructor | Cloud Auditor | AWS reStart Instructor | AI | Machine Learning | Data Science | Training Program Curriculum Designer | Freelancer
2 年Amazing blog Rashmi Chawla ?? it incurs in-depth knowledge of IAM ????
Associate Professor at BITS Pilani (for Decision Sciences, Business Analytics and Operations)
2 年Very well explained..