AWS Identity and Access Management Flashcards
A document that identifies one or more actions related to AWS resources.
IAM Policies
Programmatically access your AWS environment
Access Keys
Associate users with common job functions with access levels to perform work functions within the AWS environment.
IAM Groups
Temporary access of 12 hours allows users or services to access your account resources in your AWS environment.
IAM Roles
AWS issues trusted IAM users temporary access of 12 hours using this security feature when assuming its new role
AWS Security Token Service (STS)
Federated identity access for mobile or untrusted users allows for sign-up and grants temporary access while controlling that access based on the definition you set up.
Amazon Cognito
Running in two AZs, this resource takes on the burden of taking care of all the necessary infrastructure for managing an AD server and moving it to the cloud
AWS Managed Microsoft AD
Acting as a gateway to redirect authentication requests from AWS service to your on-prem without caching any data on AWS.
AD Connector
This service works across multiple AWS accounts within an AWS organization. Streamlining authentication and authorizations using an existing Microsoft AD.
AWS Single Sign-On (SSO)
You can manage policy-based controls across multiple AWS accounts. Companies with more than one can use this feature to unify and integrate how assets are exposed and consumed.
AWS Organizations
It enables tracking, rotation, and deletion of keys that protect your data in the AWS account. It also integrates with CloudTrail for compliance purposes.
AWS Key Management Service (KMS)
You can deliver credentials to applications on request, allowing Amazon to rotate the credentials, encrypting the delivery and using KMS for storage at rest.
AWS Secrets Manager
This service performs cryptographic operations on your web server’s behalf. Offloading the computational load is FIPS compliant, and HPC computation can be accelerated.
AWS CloudHSM
The AWS feature enables sharing resources with users across multiple accounts within an organization or externally, allowing all authorized users to access shared resources in the same region without duplication.
AWS Resource Access Manager (AWS RAM)
An access control policy allows for granular control at the organizational level, restricting or enforcing permissions across all accounts in AWS Organizations, ensuring uniform access control org-wide.
Service Control Policies (SCP)