SlideShare uma empresa Scribd logo
1 de 58
IAM TUTORIAL
AWS IAM Tutorial
What’s in it for you?
What is AWS Security?
Types of Security
Why IAM?
What is IAM?
How IAM works
Components of IAM
Features of IAM
Demo - Create a S3 bucket using MFA feature
1
2
3
4
5
6
7
8
What is AWS Security?
What is AWS security?
• AWS cloud provides a secure virtual platform where users can deploy their applications
• Compared to on-premises environment, AWS security provides a high level of data protection at a
lower cost to it’s users
Secure
Environment
No upfront cost
Lower cost than on-
premises
Types of AWS security
There are many types of security services but some of the widely used services by AWS are:
Types of AWS security
IAM KMS Cognito WAF
There are many types of security services but some of the widely used services by AWS are:
Types of AWS security
IAM KMS Cognito WAF
There are many types of security services but some of the widely used services by AWS are:
Let’s get started with AWS IAM
Why IAM?
At a corporate
It isn’t safe to share
confidential data over the
phone or internet
BEFORE AWS
Why IAM?
Employees using
Slack
Note: Slack is an online tool which lets users communicate and share documents on the web
“Hosting Slack in AWS makes
us more confident that our
data is safe and secure”
AFTER AWS
“The fact that we can rely on the
AWS security posture to boost
our own security is really
important for our business. AWS
does a much better job at
security than we could ever do
running a cage in a data center.”
-Richard Crowley,
Director of Operations, Slack
What is IAM?
• AWS Identity and Access Management (IAM) is a web service for securely controlling access to
AWS resources
• It enables you to create and control services for user authentication or limiting access to a
certain set of users on your AWS resources
AWS
resources
Secure
access
Set
permissions
Admin
How IAM works
The IAM workflow includes the following elements:
Resources
Principal RequestAuthentication Authorization
Actions
1 2 3 4
5 6
How IAM works
2
3
4
5
Resources Authorization
Request
Actions
Authentication
• An action on an AWS resource can be
performed by a principal
• A user or a role can be a principal
Principal
AWS
resources
Principal
1
How IAM works
1
2
3
4
5
Resources Authorization
Request
Actions
Authentication
• Authentication is a process of confirming the
identity of the principal trying to access an
AWS product
• To authenticate from console, API or CLI,
you must provide your credentials or
required keys
Confirms the identity
Principal
How IAM works
1
2
3
4
5
Resources Authorization
Request
Actions
Authentication
When a principal attempts to access the AWS
Console, API or CLI, he sends a request to AWS
Request
Principal
How IAM works
1
2
3
4
5
Resources Authorization
Request
Actions
Authentication
Here, IAM uses information from the request
context to check for matching policies and
determine whether to allow or deny the request
Request
Check for policies Allow request
Deny request
Principal
How IAM works
1
2
3
4
5
Resources Authorization
Request
Actions
Authentication
• After authenticating and authorizing the
request, AWS approves the action
• Using actions, you can view, create, edit and
delete a resource
Action
AWS
resources
Principal
How IAM works
1
2
3
4
5
Resources Authorization
Request
Actions
Authentication
AWS Resources
EC2
S3
IAM
• A set of actions can be performed in a related
resource of your AWS account
• Suppose, a request is created by a user to
perform an unrelated action then the request
gets denied
• For example, if you attempt to delete an IAM
role and request to access an EC2 instance for
that role then the request gets denied
Principal
Components of IAM
Components of IAM
Users
Components of IAM
Users Groups
Roles
Policies
Components of IAM
Users Groups
Roles
Policies
Components of IAM
Users Groups
Roles
Policies
Components of IAM – User
• With IAM, you can securely manage access to AWS services
• You can create an IAM user when there is a new employee to your corporate
Note: Each IAM user is associated with only one AWS account
AWS services and resources
Secure
Components of IAM – Group
• A collection of IAM users is an IAM group
• You can use IAM groups to specify permissions for multiple users, so that any permission applied to
the group, are applied to it’s users as well
IAM Group
Specify
permissions
Components of IAM – Group (Example)
This diagram is an example of groups created for a
small company
Bobby
Suman
Brad
Jimmy
Harry
Cathy
Allen
BellaMark
Group:
Admins
Group:
Developers
Group:
Test
John
AWS
Account
Components of IAM – Group (Example)
This diagram is an example of groups created for a
small company
AWS
Account
Bobby
Suman
Brad
Jimmy
Harry
Cathy
Allen
Bella
John
Mark
Group:
Admins
Group:
Developers
Group:
Test
Set
permission to
a group
1
Permission
applied to all
users
automatically
2
New user
Note: Suppose a new user joins your organization and needs administrator privileges, then adding that user to a
relevant group will automatically set permissions
Components of IAM – Policies
• An IAM policy sets permission and controls the access to AWS resources
• Policies are stored in AWS as JSON documents
• Permissions specify who can have access to the resources and what actions they can perform
For Example, it Allows an IAM user to access
one of the buckets in Amazon S3
IAM Policy
Components of IAM – Policies (Example)
Task: To give Paul (Developer) access to Amazon S3
Components of IAM – Policies (Example)
Note: Give user name or group name
The policy would contain the following statements:
• Who
• What actions
• Which AWS resources
• When
• Whether
Paul
Task: To give Paul (Developer) access to Amazon S3
Components of IAM – Policies (Example)
Note: GET/PUT – Upload and Read access
The policy would contain the following statements:
• Who
• What actions
• Which AWS resources
• When
• Whether
Paul
Can get/put objects in S3
Task: To give Paul (Developer) access to Amazon S3
?
Components of IAM – Policies (Example)
Note: “*” can have access to all the buckets
The policy would contain the following statements:
• Who
• What actions
• Which AWS resources
• When
• Whether
Paul
Can get/put objects in S3
Bucket=“*”
Task: To give Paul (Developer) access to Amazon S3
Components of IAM – Policies (Example)
Note: Permissions will expire on the given date
The policy would contain the following statements:
• Who
• What actions
• Which AWS resources
• When
• Whether
Paul
Can get/put objects in S3
Bucket=“*”
Until March 2, 2019
Task: To give Paul (Developer) access to Amazon S3
Components of IAM – Policies (Example)
The policy would contain the following statements:
• Who
• What actions
• Which AWS resources
• When
• Whether
Paul
Can get/put objects in S3
Bucket=“*”
Until March 2, 2019
Allow
Note: Whether to allow or deny permission
Task: To give Paul (Developer) access to Amazon S3
Components of IAM – Policies
Sample - S3 Public read only Policy
{
"Version": "2017-10-17",
"Id": "S3-Account-Permissions",
"Statement": [{
"Sid": “AddPublicReadPermissions",
"Effect": "Allow",
"Principal":“*”,
"Action": "s3:*",
"Resource": ["arn:AWS:s3:::bucket/*"
]
}]
}
Who can Access it
What action can a user take
Give permissions(Allow/Deny)
Specify Actions(Read/Write/Delete)
Specify the resource
Components of IAM – Policies
Types of policies
Managed Policies
It is a default policy that you
attach to multiple entities
(users, groups and roles) in
your AWS account
Inline Policies
You create and manage your
own policy that is embedded
directly into a single entity
(user, group or role)
Components of IAM – Roles
• An IAM role is a set of permissions that define what actions are allowed and denied by an entity in AWS
console
• It is similar to a user
• A role in IAM can b accessed by any entity (an individual or AWS service)
Define
permissions
AWS Services
User
Components of IAM – Roles (Example)
Create a role and give
access to S3’s “file” bucket
Bucket
Components of IAM – Roles (Example)
Create a role and give
access to S3’s “file” bucket
Bucket
With the role, a user
launches an EC2 instance
EC2
instance
Components of IAM – Roles (Example)
Create a role and give
access to S3’s “file” bucket
Bucket
With the role, a user
launches an EC2 instance
EC2
instance
From the instance,
application retrieves role
credentials
Online Application
Components of IAM – Roles (Example)
Create a role and give
access to S3’s “file” bucket
Bucket
With the role, a user
launches an EC2 instance
EC2
instance
From the instance,
application retrieves role
credentials
Using the role
credentials,
application gets S3’s
files
View S3’s file in
Application
Online Application
Features of IAM
Features of IAM
Shared access to your
AWS account
1
Features of IAM
Shared access to your
AWS account
Granular permissions
1
2
Features of IAM
Shared access to your
AWS account
Granular permissions
1
2
3
Secure access to AWS
resources for applications
running on EC2
Features of IAM
Shared access to your
AWS account
Granular permissions
Secure access to AWS
resources for applications
running on EC2
Multi-factor
authentication (MFA)
1
2
3
4
Features of IAM
Identity federation
5
Features of IAM
Identity federation
5
6
Free to use
Features of IAM
Identity federation PCI DSS Compliance
5
6
7
Free to use
Features of IAM
Identity federation PCI DSS Compliance
Password Policy
5
6
7
8
***
Free to use
Demo – Create a S3 bucket
using MFA feature
Demo - Create a S3 bucket using MFA feature
To create a S3 bucket for a company where each user can create their own READ and WRITE data with Multi-Factor
Authentication
Problem statement
Demo - Multi-Factor Authentication
For example, It refers to the oTP
when you try to log in to your Gmail
account
IAM
Your OTP is
2346
Please provide one time
password to login
Gmail
Multi-Factor Authentication (MFA) is an additional level of security process provided by AWS
Here, a user’s identity is confirmed for AWS login only after performing two levels of verification
Demo - Multi-Factor Authentication
First step of
security
Last step of
security
Log in
mFA code
Select MFA device
in IAM sErvice
Login to google
indicator app
Scan the barcode
******
The MFA device
was successfully
associated
Result
Example:Virtual
MFA device
Multi-Factor Authentication (MFA) is an additional level of security process provided by AWS
Here, a user’s identity is confirmed for AWS login only after performing two levels of verification
Demo - Multi-Factor Authentication
First step of
security
Last step of
security
Log in
mFA code
Select A MFA device
in IAM User
use indicator app
on your smartphone
Scan the barcode
******
The MFA device
was successfully
associated
Result
Example:Virtual
MFA device
Multi-Factor Authentication (MFA) is an additional level of security process provided by AWS
Here, a user’s identity is confirmed for AWS login only after performing two levels of verification
IAM
Demo - Multi-Factor Authentication
Log in
First step of
security
Last step of
security
mFA code
Select MFA device
in IAM sErvice
Login to google
indicator app
Scan the barcode
******
The MFA device
was successfully
associated
Result
Example:Virtual
MFA device
Multi-Factor Authentication (MFA) is an additional level of security process provided by AWS
Here, a user’s identity is confirmed for AWS login only after performing two levels of verification
IAM
Demo - Create a S3 bucket using MFA feature
To create a S3 bucket for a company where each user can create their own READ and WRITE data with Multi-Factor
Authentication
To create policies and assign permissions for a user and a group
• Provide access (read and write) to the developer group
• Provide a policy where a user is allowed to read or denied to write an object in S3 bucket
Problem statement
Task
Key Takeaways
Demo

Mais conteúdo relacionado

Mais de Simplilearn

Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Simplilearn
 
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
Simplilearn
 
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Simplilearn
 
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Simplilearn
 
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Simplilearn
 
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
Simplilearn
 
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
Simplilearn
 
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
Simplilearn
 
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
Simplilearn
 
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Simplilearn
 
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
Simplilearn
 
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
Simplilearn
 
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Simplilearn
 
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Simplilearn
 
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
Simplilearn
 
Instagram Ads.pptx
Instagram Ads.pptxInstagram Ads.pptx
Instagram Ads.pptx
Simplilearn
 
Introduction to MATLAB in 8 Minutes
Introduction to MATLAB in 8 Minutes Introduction to MATLAB in 8 Minutes
Introduction to MATLAB in 8 Minutes
Simplilearn
 
MATLAB Tutorial For Beginners 2023
MATLAB Tutorial For Beginners 2023MATLAB Tutorial For Beginners 2023
MATLAB Tutorial For Beginners 2023
Simplilearn
 
How to Install MATLAB Software in Laptop ?
How to Install MATLAB Software in Laptop ?How to Install MATLAB Software in Laptop ?
How to Install MATLAB Software in Laptop ?
Simplilearn
 
Chat GPT for Content Creation
Chat GPT for Content CreationChat GPT for Content Creation
Chat GPT for Content Creation
Simplilearn
 

Mais de Simplilearn (20)

Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
 
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
 
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
 
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
 
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
 
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
 
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
 
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
 
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
 
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
 
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
 
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
 
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
 
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
 
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
 
Instagram Ads.pptx
Instagram Ads.pptxInstagram Ads.pptx
Instagram Ads.pptx
 
Introduction to MATLAB in 8 Minutes
Introduction to MATLAB in 8 Minutes Introduction to MATLAB in 8 Minutes
Introduction to MATLAB in 8 Minutes
 
MATLAB Tutorial For Beginners 2023
MATLAB Tutorial For Beginners 2023MATLAB Tutorial For Beginners 2023
MATLAB Tutorial For Beginners 2023
 
How to Install MATLAB Software in Laptop ?
How to Install MATLAB Software in Laptop ?How to Install MATLAB Software in Laptop ?
How to Install MATLAB Software in Laptop ?
 
Chat GPT for Content Creation
Chat GPT for Content CreationChat GPT for Content Creation
Chat GPT for Content Creation
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

AWS IAM Training | AWS Identity And Access Management | AWS Training | Simplilearn

  • 2. What’s in it for you? What is AWS Security? Types of Security Why IAM? What is IAM? How IAM works Components of IAM Features of IAM Demo - Create a S3 bucket using MFA feature 1 2 3 4 5 6 7 8
  • 3. What is AWS Security?
  • 4. What is AWS security? • AWS cloud provides a secure virtual platform where users can deploy their applications • Compared to on-premises environment, AWS security provides a high level of data protection at a lower cost to it’s users Secure Environment No upfront cost Lower cost than on- premises
  • 5. Types of AWS security There are many types of security services but some of the widely used services by AWS are:
  • 6. Types of AWS security IAM KMS Cognito WAF There are many types of security services but some of the widely used services by AWS are:
  • 7. Types of AWS security IAM KMS Cognito WAF There are many types of security services but some of the widely used services by AWS are: Let’s get started with AWS IAM
  • 8. Why IAM? At a corporate It isn’t safe to share confidential data over the phone or internet BEFORE AWS
  • 9. Why IAM? Employees using Slack Note: Slack is an online tool which lets users communicate and share documents on the web “Hosting Slack in AWS makes us more confident that our data is safe and secure” AFTER AWS “The fact that we can rely on the AWS security posture to boost our own security is really important for our business. AWS does a much better job at security than we could ever do running a cage in a data center.” -Richard Crowley, Director of Operations, Slack
  • 10. What is IAM? • AWS Identity and Access Management (IAM) is a web service for securely controlling access to AWS resources • It enables you to create and control services for user authentication or limiting access to a certain set of users on your AWS resources AWS resources Secure access Set permissions Admin
  • 11. How IAM works The IAM workflow includes the following elements: Resources Principal RequestAuthentication Authorization Actions 1 2 3 4 5 6
  • 12. How IAM works 2 3 4 5 Resources Authorization Request Actions Authentication • An action on an AWS resource can be performed by a principal • A user or a role can be a principal Principal AWS resources Principal 1
  • 13. How IAM works 1 2 3 4 5 Resources Authorization Request Actions Authentication • Authentication is a process of confirming the identity of the principal trying to access an AWS product • To authenticate from console, API or CLI, you must provide your credentials or required keys Confirms the identity Principal
  • 14. How IAM works 1 2 3 4 5 Resources Authorization Request Actions Authentication When a principal attempts to access the AWS Console, API or CLI, he sends a request to AWS Request Principal
  • 15. How IAM works 1 2 3 4 5 Resources Authorization Request Actions Authentication Here, IAM uses information from the request context to check for matching policies and determine whether to allow or deny the request Request Check for policies Allow request Deny request Principal
  • 16. How IAM works 1 2 3 4 5 Resources Authorization Request Actions Authentication • After authenticating and authorizing the request, AWS approves the action • Using actions, you can view, create, edit and delete a resource Action AWS resources Principal
  • 17. How IAM works 1 2 3 4 5 Resources Authorization Request Actions Authentication AWS Resources EC2 S3 IAM • A set of actions can be performed in a related resource of your AWS account • Suppose, a request is created by a user to perform an unrelated action then the request gets denied • For example, if you attempt to delete an IAM role and request to access an EC2 instance for that role then the request gets denied Principal
  • 20. Components of IAM Users Groups Roles Policies
  • 21. Components of IAM Users Groups Roles Policies
  • 22. Components of IAM Users Groups Roles Policies
  • 23. Components of IAM – User • With IAM, you can securely manage access to AWS services • You can create an IAM user when there is a new employee to your corporate Note: Each IAM user is associated with only one AWS account AWS services and resources Secure
  • 24. Components of IAM – Group • A collection of IAM users is an IAM group • You can use IAM groups to specify permissions for multiple users, so that any permission applied to the group, are applied to it’s users as well IAM Group Specify permissions
  • 25. Components of IAM – Group (Example) This diagram is an example of groups created for a small company Bobby Suman Brad Jimmy Harry Cathy Allen BellaMark Group: Admins Group: Developers Group: Test John AWS Account
  • 26. Components of IAM – Group (Example) This diagram is an example of groups created for a small company AWS Account Bobby Suman Brad Jimmy Harry Cathy Allen Bella John Mark Group: Admins Group: Developers Group: Test Set permission to a group 1 Permission applied to all users automatically 2 New user Note: Suppose a new user joins your organization and needs administrator privileges, then adding that user to a relevant group will automatically set permissions
  • 27. Components of IAM – Policies • An IAM policy sets permission and controls the access to AWS resources • Policies are stored in AWS as JSON documents • Permissions specify who can have access to the resources and what actions they can perform For Example, it Allows an IAM user to access one of the buckets in Amazon S3 IAM Policy
  • 28. Components of IAM – Policies (Example) Task: To give Paul (Developer) access to Amazon S3
  • 29. Components of IAM – Policies (Example) Note: Give user name or group name The policy would contain the following statements: • Who • What actions • Which AWS resources • When • Whether Paul Task: To give Paul (Developer) access to Amazon S3
  • 30. Components of IAM – Policies (Example) Note: GET/PUT – Upload and Read access The policy would contain the following statements: • Who • What actions • Which AWS resources • When • Whether Paul Can get/put objects in S3 Task: To give Paul (Developer) access to Amazon S3 ?
  • 31. Components of IAM – Policies (Example) Note: “*” can have access to all the buckets The policy would contain the following statements: • Who • What actions • Which AWS resources • When • Whether Paul Can get/put objects in S3 Bucket=“*” Task: To give Paul (Developer) access to Amazon S3
  • 32. Components of IAM – Policies (Example) Note: Permissions will expire on the given date The policy would contain the following statements: • Who • What actions • Which AWS resources • When • Whether Paul Can get/put objects in S3 Bucket=“*” Until March 2, 2019 Task: To give Paul (Developer) access to Amazon S3
  • 33. Components of IAM – Policies (Example) The policy would contain the following statements: • Who • What actions • Which AWS resources • When • Whether Paul Can get/put objects in S3 Bucket=“*” Until March 2, 2019 Allow Note: Whether to allow or deny permission Task: To give Paul (Developer) access to Amazon S3
  • 34. Components of IAM – Policies Sample - S3 Public read only Policy { "Version": "2017-10-17", "Id": "S3-Account-Permissions", "Statement": [{ "Sid": “AddPublicReadPermissions", "Effect": "Allow", "Principal":“*”, "Action": "s3:*", "Resource": ["arn:AWS:s3:::bucket/*" ] }] } Who can Access it What action can a user take Give permissions(Allow/Deny) Specify Actions(Read/Write/Delete) Specify the resource
  • 35. Components of IAM – Policies Types of policies Managed Policies It is a default policy that you attach to multiple entities (users, groups and roles) in your AWS account Inline Policies You create and manage your own policy that is embedded directly into a single entity (user, group or role)
  • 36. Components of IAM – Roles • An IAM role is a set of permissions that define what actions are allowed and denied by an entity in AWS console • It is similar to a user • A role in IAM can b accessed by any entity (an individual or AWS service) Define permissions AWS Services User
  • 37. Components of IAM – Roles (Example) Create a role and give access to S3’s “file” bucket Bucket
  • 38. Components of IAM – Roles (Example) Create a role and give access to S3’s “file” bucket Bucket With the role, a user launches an EC2 instance EC2 instance
  • 39. Components of IAM – Roles (Example) Create a role and give access to S3’s “file” bucket Bucket With the role, a user launches an EC2 instance EC2 instance From the instance, application retrieves role credentials Online Application
  • 40. Components of IAM – Roles (Example) Create a role and give access to S3’s “file” bucket Bucket With the role, a user launches an EC2 instance EC2 instance From the instance, application retrieves role credentials Using the role credentials, application gets S3’s files View S3’s file in Application Online Application
  • 42. Features of IAM Shared access to your AWS account 1
  • 43. Features of IAM Shared access to your AWS account Granular permissions 1 2
  • 44. Features of IAM Shared access to your AWS account Granular permissions 1 2 3 Secure access to AWS resources for applications running on EC2
  • 45. Features of IAM Shared access to your AWS account Granular permissions Secure access to AWS resources for applications running on EC2 Multi-factor authentication (MFA) 1 2 3 4
  • 46. Features of IAM Identity federation 5
  • 47. Features of IAM Identity federation 5 6 Free to use
  • 48. Features of IAM Identity federation PCI DSS Compliance 5 6 7 Free to use
  • 49. Features of IAM Identity federation PCI DSS Compliance Password Policy 5 6 7 8 *** Free to use
  • 50. Demo – Create a S3 bucket using MFA feature
  • 51. Demo - Create a S3 bucket using MFA feature To create a S3 bucket for a company where each user can create their own READ and WRITE data with Multi-Factor Authentication Problem statement
  • 52. Demo - Multi-Factor Authentication For example, It refers to the oTP when you try to log in to your Gmail account IAM Your OTP is 2346 Please provide one time password to login Gmail Multi-Factor Authentication (MFA) is an additional level of security process provided by AWS Here, a user’s identity is confirmed for AWS login only after performing two levels of verification
  • 53. Demo - Multi-Factor Authentication First step of security Last step of security Log in mFA code Select MFA device in IAM sErvice Login to google indicator app Scan the barcode ****** The MFA device was successfully associated Result Example:Virtual MFA device Multi-Factor Authentication (MFA) is an additional level of security process provided by AWS Here, a user’s identity is confirmed for AWS login only after performing two levels of verification
  • 54. Demo - Multi-Factor Authentication First step of security Last step of security Log in mFA code Select A MFA device in IAM User use indicator app on your smartphone Scan the barcode ****** The MFA device was successfully associated Result Example:Virtual MFA device Multi-Factor Authentication (MFA) is an additional level of security process provided by AWS Here, a user’s identity is confirmed for AWS login only after performing two levels of verification IAM
  • 55. Demo - Multi-Factor Authentication Log in First step of security Last step of security mFA code Select MFA device in IAM sErvice Login to google indicator app Scan the barcode ****** The MFA device was successfully associated Result Example:Virtual MFA device Multi-Factor Authentication (MFA) is an additional level of security process provided by AWS Here, a user’s identity is confirmed for AWS login only after performing two levels of verification IAM
  • 56. Demo - Create a S3 bucket using MFA feature To create a S3 bucket for a company where each user can create their own READ and WRITE data with Multi-Factor Authentication To create policies and assign permissions for a user and a group • Provide access (read and write) to the developer group • Provide a policy where a user is allowed to read or denied to write an object in S3 bucket Problem statement Task
  • 58. Demo

Notas do Editor

  1. Style - 01