Security, Identity & Compliance | AWS Identity and Access Management (IAM) Flashcards
(175 cards)
What is AWS Identity and Access Management (IAM)?
General
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You can use AWS IAM to securely control individual and group access to your AWS resources. You can create and manage user identities (“IAM users”) and grant permissions for those IAM users to access your resources. You can also grant permissions for users outside of AWS (federated users).
How do I get started with IAM?
General
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
To start using IAM, you must subscribe to at least one of the AWS services that is integrated with IAM. You then can create and manage users, groups, and permissions via IAM APIs, the AWS CLI, or the IAM console, which gives you a point-and-click, web-based interface. You can also use the visual editor to create policies.
What problems does IAM solve?
General
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
IAM makes it easy to provide multiple users secure access to your AWS resources. IAM enables you to:
Manage IAM users and their access: You can create users in AWS’s identity management system, assign users individual security credentials (such as access keys, passwords, multi-factor authentication devices), or request temporary security credentials to provide users access to AWS services and resources. You can specify permissions to control which operations a user can perform.
Manage access for federated users: You can request security credentials with configurable expirations for users who you manage in your corporate directory, allowing you to provide your employees and applications secure access to resources in your AWS account without creating an IAM user account for them. You specify the permissions for these security credentials to control which operations a user can perform.
Who can use IAM?
General
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Any AWS customer can use IAM. The service is offered at no additional charge. You will be charged only for the use of other AWS services by your users.
What is a user?
General
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
A user is a unique identity recognized by AWS services and applications. Similar to a login user in an operating system like Windows or UNIX, a user has a unique name and can identify itself using familiar security credentials such as a password or access key. A user can be an individual, system, or application requiring access to AWS services. IAM supports users (referred to as “IAM users”) managed in AWS’s identity management system, and it also enables you to grant access to AWS resources for users managed outside of AWS in your corporate directory (referred to as “federated users”).
What can a user do?
General
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
A user can place requests to web services such as Amazon S3 and Amazon EC2. A user’s ability to access web service APIs is under the control and responsibility of the AWS account under which it is defined. You can permit a user to access any or all of the AWS services that have been integrated with IAM and to which the AWS account has subscribed. If permitted, a user has access to all of the resources under the AWS account. In addition, if the AWS account has access to resources from a different AWS account, its users may be able to access data under those AWS accounts. Any AWS resources created by a user are under control of and paid for by its AWS account. A user cannot independently subscribe to AWS services or control resources.
How do users call AWS services?
General
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Users can make requests to AWS services using security credentials. Explicit permissions govern a user’s ability to call AWS services. By default, users have no ability to call service APIs on behalf of the account.
How do I get started with IAM?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
To start using IAM, you must subscribe to at least one of the AWS services that is integrated with IAM. You then can create and manage users, groups, and permissions via IAM APIs, the AWS CLI, or the IAM console, which gives you a point-and-click, web-based interface. You can also use the AWS Policy Generator to create policies.
How are IAM users managed?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
IAM supports multiple methods to:
Create and manage IAM users.
Create and manage IAM groups.
Manage users’ security credentials.
Create and manage policies to grant access to AWS services and resources.
You can create and manage users, groups, and policies by using IAM APIs, the AWS CLI, or the IAM console. You also can use the visual editor and the IAM policy simulator to create and test policies.
What is a group?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
A group is a collection of IAM users. Manage group membership as a simple list:
Add users to or remove them from a group.
A user can belong to multiple groups.
Groups cannot belong to other groups.
Groups can be granted permissions using access control policies. This makes it easier to manage permissions for a collection of users, rather than having to manage permissions for each individual user.
Groups do not have security credentials, and cannot access web services directly; they exist solely to make it easier to manage user permissions. For details, see Working with Groups and Users.
What kinds of security credentials can IAM users have?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
IAM users can have any combination of credentials that AWS supports, such as an AWS access key, X.509 certificate, SSH key, password for web app logins, or an MFA device. This allows users to interact with AWS in any manner that makes sense for them. An employee might have both an AWS access key and a password; a software system might have only an AWS access key to make programmatic calls; IAM users might have a private SSH key to access AWS CodeCommit repositories; and an outside contractor might have only an X.509 certificate to use the EC2 command-line interface. For details, see Temporary Security Credentials in the IAM documentation.
Which AWS services support IAM users?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You can find the complete list of AWS services that support IAM users in the AWS Services That Work with IAM section of the IAM documentation. AWS plans to add support for other services over time.
Can I enable and disable user access?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Yes. You can enable and disable an IAM user’s access keys via the IAM APIs, AWS CLI, or IAM console. If you disable the access keys, the user cannot programmatically access AWS services.
Who is able to manage users for an AWS account?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
The AWS account holder can manage users, groups, security credentials, and permissions. In addition, you may grant permissions to individual users to place calls to IAM APIs in order to manage other users. For example, an administrator user may be created to manage users for a corporation—a recommended practice. When you grant a user permission to manage other users, they can do this via the IAM APIs, AWS CLI, or IAM console.
Can I structure a collection of users in a hierarchical way, such as in LDAP?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Yes. You can organize users and groups under paths, similar to object paths in Amazon S3—for example /mycompany/division/project/joe.
Can I define users regionally?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Not initially. Users are global entities, like an AWS account is today. No region is required to be specified when you define user permissions. Users can use AWS services in any geographic region.
How are MFA devices configured for IAM users?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You (the AWS account holder) can order multiple MFA devices. You can then assign these devices to individual IAM users via the IAM APIs, AWS CLI, or IAM console.
What kind of key rotation is supported for IAM users?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
User access keys and X.509 certificates can be rotated just as they are for an AWS account’s root access identifiers. You can manage and rotate programmatically a user’s access keys and X.509 certificates via the IAM APIs, AWS CLI, or IAM console.
Can IAM users have individual EC2 SSH keys?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Not in the initial release. IAM does not affect EC2 SSH keys or Windows RDP certificates. This means that although each user has separate credentials for accessing web service APIs, they must share SSH keys that are common across the AWS account under which users have been defined.
Where can I use my SSH keys?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Currently, IAM users can use their SSH keys only with AWS CodeCommit to access their repositories.
Do IAM user names have to be email addresses?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
No, but they can be. User names are just ASCII strings that are unique within a given AWS account. You can assign names using any naming convention you choose, including email addresses.
Which character sets can I use for IAM user names?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You can only use ASCII characters for IAM entities.
Are user attributes other than user name supported?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Not at this time.
How are user passwords set?
IAM User Management
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You can set an initial password for an IAM user via the IAM console, AWS CLI, or IAM APIs. User passwords never appear in clear text after the initial provisioning, and are never displayed or returned via an API call. IAM users can manage their passwords via the My Password page in the IAM console. Users access this page by selecting the Security Credentials option from the drop-down list in the upper right corner of the AWS Management Console.