An overview of AWS Identity and Access Management (IAM)

An overview of AWS Identity and Access Management (IAM)

Identity and Access Management (IAM) is one of the essential services in Amazon Web Services (AWS) and also can be complicated for newcomers to AWS.

In this article, I will try to explore the Identity and Access Management concepts in AWS.

What is IAM?

IAM allows you to manage “who and what can do with your resources”.

IAM is the Identity and Access Management service, and it's a way that we can authenticate and be authorized to access services on AWS.

This is from a security perspective called zero trust, and that's what AWS operates:

  • Authentication – validates a user's identity.
  • Authorization – grants the user permission to access a resource.

What are the capabilities of IAM?

  1. IAM User Sign-in Credentials

One of the best practices is to create separate users for employees in your organization and grant them the least privilege required for the job. Additionally, you can create groups with specific permissions and add users to them. Users in AWS can sign in using the console or CLI. IAM creates a User ID and password if the users will sign in through the console and creates Access Key and Secret Access Key for the CLI which is called programmatic access.

2. IAM User Access Management

Users don't have any permissions by default. So you can provide access to the users in different ways.

  • Identity-based policy – to attach policy to the user.
  • Resource-based policy – to attach policy to the resource to define who's allowed to the resource and what actions they can do.

3. IAM roles

An IAM role doesn't have long-term credentials such as passwords or access keys like IAM users. IAM roles use Amazon Security Token Service (STS) temporarily credentials that have an expiry time. IAM role can be assumed by anyone (user – AWS service – EC2 – Federation).

In conclusion, there are four main components of IAM:

  • Users?– A user can be a person or an application that needs to interact with AWS resources.
  • User Groups?– When you have multiple users can have similar permissions to resources.
  • Policies?– Policies are statements or the rules that define what access is granted or denied to a specific user or a group.
  • Roles?– ?A role is not directly linked to a person or a service, rather it can be assumed by any resource that the role grants permission to. Role credentials are always temporary and rotated periodically by the AWS Session Token Service (STS).

I hope this was a useful overview of the major topics you will encounter when using it.

#aws #awswhitepapers

要查看或添加评论,请登录

Yusuf Amr的更多文章

  • What is OAuth? And how it works?

    What is OAuth? And how it works?

    OAuth is a delegated authorization, stands for open standard for access delegation, commonly used to enable apps to…

  • Security Enhanced Linux (SELinux)

    Security Enhanced Linux (SELinux)

    Introduction SELinux stands for Security Enhanced Linux, which is an additional layer of system security. The primary…

  • Advanced Static Malware Analysis

    Advanced Static Malware Analysis

    I would like to share some of my notes of the advanced static malware analysis from what I learned from PMAT (Practical…

    1 条评论
  • Basic Static Malware Analysis

    Basic Static Malware Analysis

    I would like to share some of my notes of how to do basic static malware analysis from what I learned from PMAT…

  • SIEM solutions in AWS

    SIEM solutions in AWS

    If you have a cloud infrastructure on Amazon Web Services (AWS) and you need a security information and event…

  • Amazon GuardDuty

    Amazon GuardDuty

    Amazon GuardDuty is a managed cloud security monitoring service that detects behavior or threats that can compromise…

  • Implementing S3

    Implementing S3

    I met IT engineers of a popular hotel in Egypt that totally depends on the traditional network. We talked about many…

  • AWS Edge Security

    AWS Edge Security

    Security at AWS starts with core infrastructure and out to customer edge devices and endpoints. The AWS global network…

社区洞察

其他会员也浏览了