Difference between revisions of "AWS Solutions Architect/training/Section 3: Identity Management and Permissions"

From Freephile Wiki
Jump to navigation Jump to search
Line 16: Line 16:
  
 
25. Access Control Methods - RBAC & ABAC
 
25. Access Control Methods - RBAC & ABAC
 +
 +
Users are assigned permissions through policies attached to groups.
 +
 +
Groups are organized by job function.
 +
 +
Best practice is to grant the minimum premissions required to perform the job.
  
 
26. Permissions Boundaries
 
26. Permissions Boundaries

Revision as of 18:26, 7 February 2024

17. Introduction

18. How IAM Works

19. Overview of Users, Groups, Roles and Policies

20. IAM Authentication Methods

21. AWS Security Token Service (STS)

22. Multi-Factor Authentication (MFA)

23. [HOL] Setup Multi-Factor Authentication (MFA)

24. Identity-Based Policies and Resource-Based Policies

25. Access Control Methods - RBAC & ABAC

Users are assigned permissions through policies attached to groups.

Groups are organized by job function.

Best practice is to grant the minimum premissions required to perform the job.

26. Permissions Boundaries

27. IAM Policy Evaluation

28. IAM Policy Structure

29. [HOL] Using Role-Based Access Control (RBAC)

30. [HOL] Using Attribute-Based Access Control (ABAC)

31. [HOL] Apply Permissions Boundary

32. Use Cases for IAM Roles

33. [HOL] Cross-Account Access to S3

34. Access Keys and IAM Roles with EC2

35. [HOL] Amazon EC2 Instance Profile

36. AWS IAM Best Practices