IAM Flashcards
Main components of IAM Service
User
Group
IAM Role
MFA
IAM Policy
API keys (Programmatic access)
User account
Assigned to a service or
Individual
How to configure what a users is allowed to do within AWS?
Creating an IAM Policy and attach it to a USer.
It could be done directly or through a group
Another way is with a role
What is an IAM User?
An entity which represents:
* a person
* a service
What can be assigned to an IAM user?
An access key
A password for access to the management console
What is an access key?
Is an ID and a secret access key for programmatic access to the AWS API, CLI, SDK
Best practices for the root accounts:
Don’t use the root users credentials
Don’t share the root users credentials
Create an IAM user and assign administrative permissions as required
Enable Multi-Factor Authentication for it
How many users can you have per AWS account?
5000
What is ARN?
Amazon Resource Name which uniquely identifies the user across AWS
What are IAM Groups?
Collections of users and have policies attached to them
What are the groups for?
Assign permissions to users
Who does assume the roles?
Another entity
What are IAM Policies?
Documents that define permissions and can be applied to users, groups and roles
When you have several policies which one is applied?
The mos restrictive policy
What is the policy simulator?
A toolto help you understand, test, and validate the effects of access control policies
What is an MFA?
Something you know (pwd)
Something you have (token)
Something you are
Who is MFA in AWS?
A password
Virtual MFA or Phisical MFA
What is Security Token Service (STS)?
Is a web service that enables you to request temporary, limited-privilege credentials for IAM users or for users that you authenticate (federated users)
IAM Best Practices
Lock away the AWS root users access keys
Create individual IAM users
Uses AWS defined policies to assign permissions whenever possible
use groups to assign permissions to IAM users
Grant least privilege
Uses access levels to review IAM permissions
Configure a strong password policy for users
Use roles for applicatiosn that run on AWS EC2 instances
Delegate by using roles instead of sharing credentials
Rotate credentials regularly
Remove unnecessary credentials
use policy conditions for extra security
Monitor activity in your AWS account
IAM Bestpractices (2)
