Identity Access Management by Techserverglobal.pptx
HarpalGohil4
30 views
13 slides
Feb 25, 2025
Slide 1 of 13
1
2
3
4
5
6
7
8
9
10
11
12
13
About This Presentation
Identity Access Management by Techserverglobal.pptx
Size: 624.72 KB
Language: en
Added: Feb 25, 2025
Slides: 13 pages
Slide Content
Identity Access Management
Agenda Introduction to IAM IAM Concepts Key IAM Features IAM Best Practices
Introduction AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. With IAM, you can centrally manage permissions that control which AWS resources users can access. You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources.
IAM Concept
Key IAM Features Users Groups Policies Roles
Users An IAM user is an identity with an associated credential and permissions attached to it. This could be an actual person who is a user, or it could be an application that is a user. With IAM, you can securely manage access to AWS services by creating an IAM user name for each employee in your organization. Each IAM user is associated with only one AWS account. By default, a newly created user is not authorized to perform any action in AWS. The advantage of having one-to-one user specification is that you can individually assign permissions to each user.
Group A collection of IAM users is an IAM group. You can use IAM groups to specify permissions for multiple users so that any permissions applied to the group are applied to the individual users in that group as well. You set permissions for the group, and those permissions are automatically applied to all the users in the group. If you add another user to the group, the new user will automatically inherit all the policies and the permissions already assigned to that group.
Policies An IAM policy sets permission and controls access to AWS resources. Policies are stored in AWS as JSON documents. Permissions specify who has access to the resources and what actions they can perform.
Policy: AmazonS3ReadOnlyAccess { "Version": "2012-10-17", == This indicates the version of the policy language being used "Statement": [ == This is an array of statements that define the permissions granted by the policy. { "Effect": "Allow", == This is the effect of the statement, which is set to "Allow." It means that this policy allows the specified actions on the specified resources. "Action": [ This is an array of actions that this policy allows. "s3:Get*", "s3:List*", "s3:Describe*", "s3-object-lambda:Get*", "s3-object-lambda:List*" ], "Resource": "*" == The asterisk (*) is a wildcard, meaning that this policy allows the specified actions on all S3 } ] }
Roles An IAM role is a set of permissions that define what actions are allowed and denied by an entity in the AWS console. It is similar to a user in that it can be accessed by any type of entity (an individual or AWS service). Role permissions are temporary credentials.
IAM Best Practices Monitor and log IAM activity. Use IAM Access Analyzer. Implement strong password policies. Follow the principle of separation of duties. Establish a strong naming convention. Leverage IAM policy summaries. Stay informed about AWS security features and updates.