SecurityAccount Management
SecurityAccount Management
As a cloud consultant for a Fortune 500 company, you are assisting the clients in
addressing their security concerns before they move to the cloud.
Now, your task is to find the relevant solutions. This lesson will provide you with
the necessary concepts to meet these requirements.
Learning Objectives
The primary purpose of IAM is to manage accessibility to various AWS services and resources.
Identity and Access Management (IAM)
IAM user is an AWS entity that represents the person or application that interacts with the AWS.
It is generally used for signing into the AWS Management Console and making requests to the AWS services.
IAM Users
An IAM group is a collection of IAM users with similar roles or access requirements.
AWS
They streamline the administration of access control, as changes to permissions only need to be
made at the group level, and they automatically apply to all users within the group.
IAM Groups
Problem Statement:
You have been assigned a task to establish an IAM group on AWS and add a user to this group for
streamlined permissions management.
Assisted Practice: Guidelines
Steps to be followed:
The IAM policy is an AWS object that defines the permissions granted to an identity (IAM user or
role) or a resource when associated with it. Most of the policies are saved as JSON documents.
When a request is made by an IAM principal (user or role), AWS reviews the policies, and then the
request is either approved or rejected based on the policy permissions.
IAM Policies
Identity-based policies 1
2 Resource-based policies
Session policies 6
3 Permissions boundaries
These policies are JSON documents that define permissions for IAM identities, such as IAM users or IAM groups
They specify the actions that a particular identity can perform on AWS resources and the
conditions under which these actions are allowed.
IAM Policies: Identity-Based Policies
Managed policies
They are standalone identity-based policies that can be attached to multiple users, groups,
or roles.
IAM Policies: Managed Policies
These are predefined policies that are created and managed by AWS.
IAM Policies: Managed Policies
These are IAM policies that are created and managed by the AWS account customer, rather
than being predefined by AWS.
IAM Policies: Identity-Based Policies
Inline policies
● These are IAM policies that are created and attached directly to a single identity (user,
group, or role) within AWS.
● Unlike managed policies that can be shared and reused across multiple identities, inline
policies maintain a one-to-one relationship with the identity they are attached to.
IAM Policies: Resource-Based Policies
These policies are used to grant permissions for specific principles (users, groups, or roles) to perform
actions on AWS resources.
They allow resource owners to control access to their resources without relying solely on IAM policies
attached to IAM users or roles.
IAM Policies: Permissions Boundaries
A permission boundary specifies the highest number of permissions that identity-based policies can
provide to an entity.
When an entity with a permission boundary is provided, it can only do tasks that are permitted by both
identity-based policies and permissions boundaries.
IAM Policies: Organizations SCPs
AWS Organization Service Control Policy (SCP) is a service that allows users to group and manage all
their company's AWS accounts in one place.
They are JSON policies that specify an organization's or organizational unit's highest permissions.
IAM Policies: Access Control Lists (ACLs)
ACLs are service policies that help in managing the principles in other accounts that have
access to a resource.
It is the only type of policy that does not work on the JSON policy document structure.
IAM Policies: Access Control Lists
ACLs are enabled and supported on Amazon S3, AWS WAF, and Amazon VPC instances, allowing for
access control and permissions management.
IAM Policies: Session Policies
They are advanced policies that are passed as a parameter in a temporary session for a role or
federated user.
AWS Multi-Factor Authentication (MFA) is a straightforward and effective security measure that
provides an additional layer of protection beyond traditional username and password authentication.
IAM Multi-Factor Authentication
The users are prompted to provide their username, password, and the authentication code from their
AWS MFA device when logging into an AWS Management Console.
These factors improve the security of AWS account settings and resources.
AWS Access keys
Access keys are long-term privileges provided to an IAM user or the AWS account root user.
Users can avoid the need to access the AWS Management Console for repetitive tasks, streamlining
their workflows and saving time by utilizing the AWS CLI.
AWS Software Development Kit (SDK)
The AWS SDK is a set of software tools for developing apps and libraries that utilize AWS resources.
AWS SDK for browser-based development enables developers to utilize AWS services directly from
JavaScript code executed within the browser.
IAM Roles for AWS Services
IAM roles allow users to assign access with defined permissions to trustworthy entities without
disclosing long-term access credentials.
Using the AWS Security Token Service (STS) AssumeRole APIs, users can create an IAM role, which
in turn generates a set of temporary security credentials.
These credentials enable applications to sign requests to AWS service APIs securely.
Assisted Practice
Problem Statement:
You have been assigned a task to create and assign an IAM role to the Amazon EC2 service.
Assisted Practice: Guidelines
Steps to be followed:
AWS offers a range of security tools designed to monitor and respond to potential events
affecting users' AWS resources.
Amazon CloudWatch
IAM Access Analyzer
Logs
IAM Security Tools
AWS CloudTrail
It captures all API calls for IAM and AWS STS as events, including calls
from the console and API calls.
Amazon CloudWatch
It monitors the AWS resources and applications that users run on AWS
in real-time. Users can track metrics, create customized dashboards,
and set alarms using CloudWatch.
It helps users to monitor, store, and access their log files from
Amazon EC2 instances, CloudTrail, and other sources.
IAM Best Practices
IAM provides a range of security options for developing and implementing security rules.
It is a web-based shell that enables users to securely interact with AWS resources, offering ease
of operation and exploration.
Simplified
management Secure environment
Pre-configured
Cost optimization
environment
AWS Shared Responsibility Model
AWS Shared Responsibility Model
AWS and the customers share the responsibility for security and compliance.
This shared approach might help relieve the customer's operating load depending on the
services delivered.
AWS Responsibility: Security of the Cloud
They enable users to centrally maintain and administer your environment as they develop and
expand the AWS resources.
They allow users to create new AWS accounts and distribute resources programmatically, allowing
them to structure their workflows, apply policies, and simplify invoicing by using a single method.
Features of AWS Organizations
These are cost-effective pricing plans that provide discounted rates compared to on-demand pricing.
These plans require a commitment for a specific consumption amount (measured in $ per hour)
over one or three years.
Key Benefits of Savings Plan
Easy-to-use
AWS Pricing Principles
Optimization of AWS
Power of flexibility
cost
12 months free
Always free
Trials
AWS Cost Management Tools
Amazon provides several free tools to help users optimize cloud costs. These are:
AWS Budgets
Amazon CloudWatch
Compute Optimizer
AWS Compute Optimizer uses machine learning to analyze historical usage and recommend
optimal AWS resources for workloads, minimizing costs and improving performance.
Key Benefits of Compute Optimizer
Starts quickly
Billing and Costing Tool: Overview
AWS provides several tools are incredibly beneficial to infrastructure and operations managers
since they can aid in the discovery of:
It examines user’s AWS environment, and then provides recommendations when there are chances
to save money, improve system availability and performance, or help close security gaps.
AWS Trusted Advisor
Organizations today are confused about the various alternatives for storing crypto keys on the
cloud for security.
AWS Key Management Service (KMS) and AWS CloudHSM are two crypto key management
services available on their cloud.
Encryption with AWS CloudHSM
A service that makes it simple to create, manage, and deploy public and private Secure Sockets
Layer (SSL) or Transport Layer Security (TLS) certificates for usage with AWS services and internal
linked resources
AWS Certificate Manager
It helps in protecting secrets that are required to access your apps, services, and IT assets.
The service helps to easily rotate, manage, and obtain database credentials, API keys, and other
secrets throughout their lifespan.
Features of AWS Secrets Manager
It gives instant access to AWS security and compliance information, as well as a few online
agreements.
AWS GuardDuty
It is a continuous monitoring service for AWS instances that detects and alerts
potential risks.
It protects all AWS accounts and workloads with actionable threat protection.
AWS GuardDuty
A vulnerability management service that checks AWS workloads for software flaws and
accidental network exposure on a regular basis
By connecting information from common vulnerabilities and exposures (CVE) with criteria like
network access and exploitability, the Amazon Inspector generates a highly contextualized risk
assessment for each result.
AWS Inspector
It helps the small security teams and developers to reassure infrastructure workload
security and compliance across their AWS workloads.
Key Takeaways