IAM (Identity and Access Management) Flashcards
Overview
least privilege principle
Access Advisor
Need more details
Cognito
Identity management
Let aws user add sign-in, signup to web and mobile apps quickly
Support OIDC, SAML 2.0
Directory services
Managed Microsoft active directory
Account alias
Customize login url
used as the account ID
IAM Root user
created by default, should not share, has the most power
MFA should be enabled
IAM Users
can be part of 0 to n groups
IAM Identities
Users
Groups
Roles
IAM Group
Contains users only
IAM Policies
Types
Identity-based: attach managed and inline policies to IAM identities → grant permission to identities
Resource-based policies: attach inline policies to resources.
Permissions boundaries:
Define maximum permissions that the identity-based policies can grant to an entity
Does not grant specific permission
Do not define the maximum permissions that a resource-based policy can grant
Organizations SCPs:
Use with AWS Organizations
Define the maximum permissions for account members of and organization or organization unit
Do not grant a specific permission
Access Control Lists (ACLs)
The only policy that doesn’t use JSON structure
Similar to resource-based policies
Session policies
Used to manage access by creating policy and attach to IAM identities
Define permissions
When creating a new IAM Policy, these are the required fields:
PolicyName
PolicyDocument
AWS managed policies
Standalone policies created and managed by AWS
Provide permissions for common use cases
Customer managed policies
Standalone policies that are created and managed by the user
Inline policies
embedded in an IAM identity
Inline vs managed policy
Roles
Not used by users but by programs
For example, assign a role to EC2 to do some tasks on aws
Strong password using password policy
Require length
prevent-reuse
force rotation
CloudShell
Terminal in the cloud (similar to google’s shell)
Terminal open in browser
Role
Consists of permissions
Use to create custom combinations of permissions
IAM Credentials report
Export all accounts to CSV highlighting which account has MFA enabled etc.