IAM - Identity and Access Management Flashcards
What are the 4 security components of IAM?
Users, Groups, Roles and Policies
What 2 things you should not do with your Root account? Mention an exception.
Use it or share it.
except for initial setup
IAM Users must be created with [2]
proper permissions
IAM policies are written in []
JSON
An IAM user is usually [3]
a physical person
IAM groups are frequently used to group based on [2]
Functions (admins, devops) and Teams (engineering, design)
IAM groups contain []
IAM users
An IAM rol is for using it []
internally, within AWS resources (machines)
An IAM policy defines what [7] do
Users, Groups and Roles can and cannot
What is IAM’s visibility?
global
IAM Permissions are governed by []
policies
You can setup [] on IAM to increase security
MFA
IAM has predefined [2]
managed policies
What is the recommended amount of permission to give users?
the minimal they need to perform their job (least privilege principles)
What is used for IAM Identity Federation?
for big enterprises, to usually integrate their own repository of users with IAM, this way, one can login into AWS using company credentials