Identity & Access Management Flashcards
AWS Definition and 4 key areas.
Amazon Web Services. Comprehensive Collection of Infrastructure Services.
- Compute
- Storage
- Database
- Networking Services
AWS Platform Capabilities
Offered as a pay-as-you-go service.
- Mobile Services
- Analytics
- Machine Learning
Root User
User account you use to sign in to AWS Management Console.
AWS Management Console
- Create
- Configure
- Monitor
AWS SDK
AWS Software Development Kit. Available for these languages: Allows user to interact with AWS MC through code. 1. Java 2. .NET 3. JavaScript 4. PHP 5. Python 6. Others
Specialty SDKs
- AWS Mobile SDK
2. AWS Internet of Things (IoT) Device SDK
AWS CLI
Command Line Available for different OS: 1. Windows 2. Linus/Unix 3. macOS *Also a PowerShell option if you prefer over the Amazon CLI.
Authentication
Verifying Identity.
Involves the method or process, action used for verifying identity of user or process.
Authorization
Determining access level.
Determines access level of an authenticated user/process to various resources like files, services, applications, data, and others.
AWS IdP
AWS can be used as an Identity Provider.
Entails storing identities and providing method used for authentication. Applies to AWS Services, AWS infrastructure and non-AWS applications (web/mobile)
AWS Planes of Access
2 planes of access.
- Control plane - allows access to perform operations on instances. Managed through API operations.
- Data plane - controls access to sign in to compute instances. (Secure Shell & Remote Desktop.
Policies (related to access)
JSON docs with 3 key value pairs.
- Effect - if the user or group is allow/denied to execute associated API
- Action - if API is allowed/denied
- Resource - defines where API is allowed/denied
AWS Federation
Federation allows user to centrally manage access to AWS Resources.
2 components:
1. Identity provider - “Who are you?”
2. Identity consumer - Stores reference of identity, grants access based on Identity Provider. (Granular)
SAML
Security Assertion Markup Language.
- Provides federation between and entity and service provider.
- Option in AWS
- Both exchange meta data using an XML document
OIDC
Open ID Connect.
- Supersedes SAML
- easier to configure than SAML
- uses tokens (instead of assertions) to provide access
3 types of OIDC tokens
Open ID Connect
- ID
- Access - access to API
- Refresh - obtain new ID token
AWS AD
Active Directory is a common identity provider.
- Used to establish trust between AD domain controller and AWS Directory Service for Microsoft AD.
- Domain controller may be on premise or in cloud.
AWS STS
Security Token System. - Creates and provides trusted users with temporary security credentials. Consists of: 1. Access key ID 2. Secret Access Key 3. Security Token
Amazon Cognito
Managed Service for handling mobile and web applications.
- Integrates with AWS STS to identify users and provide them with consistent identity over lifetime of an application.
- Useful b/c many business already have Microsoft AD and it’s easier to integrate with Cognito that implement a new identity store.
Ways to implement Microsoft AD on AWS (4).
- Running AD on an EC2 instance.
- Use an AD Connector to connect to AWS Services with an existing, on-premise Microsoft AD
- Create a Simple AD. (Microsoft AD that provides compatability with AWS Directory Services.)
- Deploying AWS Managed Microsoft AD . (Actual Microsoft Windows server managed by AWS on AWS servers.)
AWS Management Console
A web-based console that encompasses a set of service consoles for managing AWS.
- Access Service Consoles (S3 buckets, EC2, CloudWatch, AmazonAccount)
- Can choose region
- Access to Billing and common troubleshooting topics
- Create shortcuts to other consoles
- Can change password
- Compatible with tables and phones
- Can download app store, iTunes, google play
AWS Root account
AWS Root account created when user signs-up.
- Can use this root account to manage AWS account and services.
- Very powerful. AWS deletes root account access keys automatically.
- Never use this for day-to-day interactions with AWS
Root Account capabilities (5)
- Change account name
- Change root user email / password
- Change contact information
- Change local currency
- Add alternate account contacts (alternate contact information)
Logic behind multiple AWS Accounts (4).
Want to design strategy to maximize security and align with business/ governance requirements.
- Ex - Centralized security Management - would require 1 AWS account.
- Ex - Separate Environments (Dev, Test, Prod) - would require 3 accounts.
- Ex - Different Departments (esp. Autonomous Departments) - Each department would have an AWS account. Then each could have it’s own policies/ projects.
- Independent projects - Can create multiple AWS accounts (one for common services like AD) and then each project would get it’s own account and different access to resources. (Could have a common billing account for all projects).