IAM - Identity and Access Management Flashcards
(6 cards)
Least-privileged access
AWS recommended security principle where users are granted only the minimum level of access needed to perform their job duties
IAM default permissions
IAM identities start with no permissions on an AWS Account, but can be granted permissions (almost) up to those held by the Account Root User.
Types of IAM identity objects
1 - Users: represent humans or applications that need access to the AWS account
2 - Groups: collection of related users. e.g. dev team, finance or HR
3 - Roles: can be used by AWS Services, or for granting external access to an AWS account
IAM Policy
Allow or deny access to AWS services, when and only when they are attached to IAM Users, Groups or Roles
IAM 3 main jobs
1 - Identity Provider (IDP): create, modify and delete identities
2 - Identity Authenticator: authenticates the principal
3 - Identity Authoriser: allow or deny access to resources based on the Policy attached to the identity
IAM basics
- No costs for creating Users, Groups or Roles
- Global service / Global resilience (can cope with AWS infrastructure failures)
- Allow or deny its identities on its AWS account
- No direct control over external accounts or users
- Identity Federation and MFA