Module 3: Security Flashcards
What sort of credentials do we get from IAM? What do they allow us to authenticate with?
The AWS API, if our Operating System or Application has authentication as well, this will have nothing to do with that.
What do IAM policies determine?
What your authorization is (permissions)
What are IAM policies written in?
JSON format
What are the different types of IAM policies and what’s the difference between them?
Managed Policies, of which there are AWS managed and Customer Managed. These are defined elsewhere but assigned.
Inline Policies, policies written inline on a user or a role.
Why are roles better to use than just simply using a policy?
Security reasons, a role generates temporary credentials that rotate every 5 minutes. So if someone got ahold of these credentials we know it would expire and not be a concern whereas if they got policy credentials those wouldn’t change.