IAM Flashcards
What does IAM stand for?
Identity Access Management
Is IAM a global service?
Yes
How is the root account created? Should it be used or shared?
The root account is created by default. It should NEVER be used or shared.
What are users?
End users within an organization
What are groups?
Groups are a collection of users
Can groups contain other groups?
No
Do users have to belong to a group?
No
True/False: Users can only belong in one group
False, users can belong to multiple groups
What are IAM policies?
IAM policies define permissions for an action regardless of the method that you use to perform the operation. For example, if a policy allows the GetUser action, then a user with that policy can get user information from the AWS Management Console, the AWS CLI, or the AWS API.
Who can be assigned JSON documents aka ‘policies’?
Users and Groups
What is the least privilege principle?
Don’t give more permissions than a user needs
What does the IAM policy structure consist of?
Version, Id, and Statement
What does the IAM policy statement consist of?
Sid, Effect, Principal, Action, Resource, Condition
In AWS IAM policy statement, what does Sid stand for and what is it?
Sid = Statement ID
Sid is an identifier for the statement. Sid not always present.
In AWS IAM policy statement, what does the Effect show?
the Effect shows whether the statement allows or denies access
(Allow, Deny)
In AWS IAM policy statement, what does the principal show?
the account/user/role to which the policy is applied to
In AWS IAM policy statement, what does the resource show?
the Resource shows a list of resources to which the actions applied to
In AWS IAM policy statement, what does the Condition show?
the Condition shows the conditions for when the policy is in effect (optional…not always present in the statement)
What are some requirements that you can add when setting up a password policy to create stronger passwords?
Set a min password length, require specific character types (i.e upper/lower case, numbers, non-alphanumeric), allow ALL IAM users to change their passwords, set a password expiration & require users to change it, prevent password re-use