Identity and Access Management Flashcards
IAM makes it easy to provide multiple users _____ _____ to AWS resources.
Secure access
IAM can manage users’ credentials, MFA, and Groups. What are three other Key features that IAM offers?
- Roles
- Access policies
- Password policies
What must be explicitly granted to allow a user to access an AWS service?
Permission
IAM is a _____ service that is described as eventually _____.
IAM is a Universal service that is described as eventually consistent
3 Authentication methods:
- Console _________: use to login to AWS Management Console
- Access ___: Used for programmatic access
- _______ Certificates : Uses SSL/TLS certificates
- Console password: use to login to AWS Management Console
- Access keys: Used for programmatic access
- Server certificates: Uses SSL/TLS certificates
An IAM user is an entity that represents a _______ or _______
An IAM user is an entity that represents a person or service
IAM users can be created to represent applications, and these are known as _______ ________
IAM users can be created to represent applications, and these are known as Service accounts
You can have up to _____ users per AWS account
5000
IAM Groups are collections of _____ and have _____ attached to them
IAM Groups are collections of users and have policies attached to them
A ____ is not an identity and cannot be identified as a ____ in an IAM policy.
A group is not an identity and cannot be identified as a principal in an IAM policy.
Use groups to assign ______ to users.
Permission
You cannot ____ groups within groups
nest
IAM users or AWS services can assume a role to obtain ________ ________ credentials
IAM users or AWS services can assume a role to obtain temporary security credentials
Temporary security credentials are issued by the AWS ________ _____ Service
Temporary security credentials are issued by the AWS Security Token Service (STS)
IAM Policies are documents that define permissions that can be applied to _____, _____, or _____
IAM Policies are documents that define permissions that can be applied to users, groups, or roles