Section 4b: IAM - Identity Access Management Flashcards
IAM continuation, CLI, SDK, roles, security tools, best practices, and user responsibilities.
What are the 3 ways to access AWS?
- AWS Management Console (protected by password + MFA)
- AWS Command Line Interface (CLI): protected by access keys
- AWS Software Developer Kit (SDK) - for code: protected by access keys
What’s the AWS CLI?
A tool that enables you to interact with AWS services using commands in
your command-line shell
What’s the AWS SDK?
AWS Software Development Kit (AWS SDK)
What is AWS Cloudshell?
A CLI within the cloud of AWS that gives the user access to a full repository.
What is an IAM Role?
A role that allows AWS entities to perform actions on behalf of the user.
What are the 2 IAM Security Tools?
- IAM Credentials Report (account-level)
- IAM Access Advisor (user-level)
IAM Credentials Report is
a report that lists all your account’s users and the status of their various
credentials
IAM Access Advisor is
A feature that shows the service permissions granted to a user and when those services were last accessed.
IAM best practices
- Don’t use the root account except for AWS account setup
- One physical user = One AWS user
- Assign users to groups and assign permissions to groups
- Create a strong password policy
- Use and enforce the use of Multi Factor Authentication (MFA)
- Create and use Roles for giving permissions to AWS services
- Use Access Keys for Programmatic Access (CLI / SDK)
- Audit permissions of your account using IAM Credentials Report & IAM
Access Advisor - Never share IAM users & Access Keys
What is AWS responsible for according to the Shared Responsibility Model for IAM?
- Infrastructure (global
network security) - Configuration and
vulnerability analysis - Compliance validation
What is the user responsible for according to the Shared Responsibility Model for IAM?
- Users, Groups, Roles, Policies
management and monitoring - Enable MFA on all accounts
- Rotate all your keys often
- Use IAM tools to apply
appropriate permissions - Analyze access patterns &
review permissions