AWS Security Identity and compliance Flashcards
What does IAM stand for?
Identity and security access management
What is IAM purpose?
To manage:
- users
- groups
- access policies
- roles
- user credentials
- user password policies
- multi-factor authentication (MFA)
- API key for programmatic access (CLI)
What kind of access do users have by default to AWS services at first?
By default, new users are created with NO access to any AWS services
Who are IAM users?
IAM users are people who have been granted access to an AWS account.
What are the components of an IAM user?
The components of an IAM user are:
- username
- password
- permissions to access different resources
What is identity federation used for
Identity federation is used to allow secure access to resources in AWS account without creating an IAM user account.
What is MFA?
MFA (Multi Factor Authentication) uses an authentication device that continually generates random, six-digit, single-use authentication codes.
Is IAM specific to a given region?
IAM is universal (global) and does not apply to regions.
What should the root account be used for?
It is a best practice to not use the root account for anything other than billing.
What is a root account?
The “root account” is the account created when you setup the AWS account. It has complete Admin access and is the only account that has this access by default.
What is a principal?
A principal is an entity that can take an action on an AWS resource.
IAM users, roles, federated users, and applications are all AWS principals.
What do requests contain?
Requests contain:
- actions (or operations) that the principal wants to perform
- resources upon which the actions are performed
- principal information including the environment from which the request was made (IP address, user agent, SSL status, etc.)
What condition should a principal satisfy to send a request?
In order to send a request a principal must be authenticated.
How can a principal get authenticated?
- A principal can get authenticated via console with username and password.
- In addition it can be authenticated via API or CLI with access key and secret key
How is authorization implemented in AWS IAM?
By means of IAM policies which are stored in IAM as JSON documents and specify the permissions that are allowed or denied.
How are requests evaluated?
IAM checks each policy that matches the context of your request. If a single policy has a deny action IAM denies the request and stops evaluating (explicit deny).
If a single policy has a deny action IAM denies the request and stops evaluating (explicit deny).
By default, all requests are denied (implicit deny).
What are actions?
Actions are operations that can be performed on resources like: create, viewing, editing, deleting.