SlideShare a Scribd company logo
Introduction to AWS IAM
Abhishek Giri
Software Consultant
Knoldus Software LLP
Agenda
● What is IAM?
● IAM as a service
● IAM Best Practices
● Elements of IAM policy
● UseCase
● Policy Simulator
What is IAM?
Identity and access management (IAM) is the security discipline that enables
the right individuals to access the right resources at the right times for the right
reasons.
IAM enables you to securely control access to your application or product
services and resources for your users.
Using IAM, you can create and manage users and groups and use
permissions to allow and deny their access to the resources.
AWS: IAM as a service
AWS Identity and Access Management
AWS IAM roles are a web service that gives you secured "Control Access" to
AWS services for your users. IAM policies specify which services/actions are
allowed or denied.
You attach policies to group, users, and roles, which are then subject to
permissions that you define.
With IAM, you can centrally manage users, security credentials such as
access keys, and permissions that control which AWS resources users can
access.
Policies can be granted either from AWS API programmatically or the AWS
management console.
IAM gives you following features :
● Shared access to your AWS account.
● Granular permission.
● Secure access to your AWS resources.
● Identity Information.
● Integrated with many AWS resources.
● Free to use.
Types of Policies
● Managed Policy - Standalone policies that you can attach to
multiple users, groups, and roles in your AWS account. Managed
policies apply only to identities (users, groups, and roles) - not
resources.
● Inline Policy - Policies that you create and manage, and that are
embedded directly into a single user, group, or role. Resource-
based policies are another form of inline policy.
IAM Groups
● A collection of IAM users.
● You assign permission to group, all IAM user
in the inherit those permission.
IAM Users
● Can have username/password to login to aws
console.
● Can have aws credentials for making API calls
to interact with aws services.
● New IAM user have no permission to do
anything, permission must be explicilty
granted.
IAM Roles / Instance profile
● The permission of an IAM role can be granted/assigned to
EC2 instance.
● All AWS Sdk has buit-in way to auto discover AWS credentials
on AWS EC2.
-Credential file
-Environmental variable
-Instance profile
IAM Policies
● When you create a IAM group,user you
associate an IAM policy with it which specify
the permission that you want to grant.
● IAM policies are JSON formatted document
that defines AWS permission.
Elements of policy
● Version - Version specifies the current version of the policy language. It must specify it
before the statement element. In this case, our version is "2012-10-17."
● Statement - The Statement element is the main element of the policy. This element is
required. The Statement element contains an array of individual statements. Each
individual statement is a JSON block enclosed in braces { }.
● Effect - The Effect element is required and specifies whether the statement will result
in an allow or an explicit deny.
● Action - The Action element describes the specific action or actions that will be
allowed or denied. Each AWS service has its own set of actions that describe tasks
that you can perform with that service.
● Resource - The Resource element specifies the object or objects that the statement
covers. Statements must include either a Resource or a NotResource element. You
specify a resource using an ARN.
● Principal – The Principal element specifies the identity. It is use to specify the
User,AWS account that is allowed or denied acces to a resource.
Sample JSON
{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::example_bucket"
}
}
IAM Best Practices
● Protect the “root” account.
● Create the individual IAM user.
● Create and use groups.
● Set up a strong password policy.
● Use multifator authentication.
● Use Roles/Instance profiles.
● Rotate credentials often.
● Monitor IAM activity.
Protect the “root” account.
● Root account in AWS has full access to any
service.
● By design it permission cannot be restricted.
● Never create AWS credentials keys.
Create the individual IAM user.
● Each user get his/her account.
● Makes managing of users easy.
● Makes defining policies of each user easy.
Create and use groups
● Group allows you to logically define set of
users.
● Groups can define different set of policies.
● Users can be part of multiple groups. They will
inherit permission for both the groups.
Set up a strong password policy.
● Users should have permission to manage their
own passwords.
● You can define a strong password policy that
enforces things like minimum length,
complexity, periodic rotation etc.
Use multifator authentication
● In addition to using a username and
password, IAM has an option setting up a
second factor.
Use Roles/Instance profiles.
● If you have an app/script that needs to make
an API call to AWS, as far as possible avoid
using static access keys.
● Instead use Roles/Instance Profiles.
● AWS automatically expires the credentials.
Rotate credentials often
● Enforce all the keys and passwords to be
changed often.
● Passwords should be changed once in 90
days.
● Keys could be rotated much more often.
● All keys should have the permission to create
another set of keys and delete the old ones.
Monitor IAM activity
● AWS gives you logs for ALL IAM operations.
● Typically this will be in Cloud Trail. Logs are
sent to S3 bucket you define.
● Use this information to keep a close watch on
what's happening.
● Setup alerts on interesting activities.
UseCase
CodeSquad
Introduction to AWS IAM
In the above diagram, each user has access to his/her object in the bucket.
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:GetObjectVersion"
],
"Resource": "arn:aws:s3:::examplebucket/${aws:username}/*"
}]
}
Instead of attaching policies to each user, policies can be attached at the group level.
After that, we can add users to that group. The following policy allows a set of
Amazon S3 permissons in bucketName/${aws:username} folder. When the policy is
evaluated, the policy is replaced by requested username.
Policy Simulator
https://policysim.aws.amazon.com/home/index.jsp?#
Reference Link
http://docs.aws.amazon.com/IAM/latest/UserGuide/introduction.html
Thank You

More Related Content

What's hot (20)

PPTX
AWS SQS SNS
Durgesh Vaishnav
 
PPTX
AWS Monitoring & Logging
Jason Poley
 
PPTX
Introduction to Amazon Web Services (AWS)
Garvit Anand
 
PPTX
Introduction to AWS VPC, Guidelines, and Best Practices
Gary Silverman
 
PDF
AWS Connectivity, VPC Design and Security Pro Tips
Shiva Narayanaswamy
 
PDF
AWS
ARYA TM
 
PDF
Iam presentation
AWS UG PK
 
PPTX
What is AWS?
Martin Yan
 
PDF
AWS Lambda
Scott Leberknight
 
PPTX
Azure active directory
Raju Kumar
 
PPTX
Basics AWS Presentation
Shyam Kumar
 
PPTX
AWS solution Architect Associate study material
Nagesh Ramamoorthy
 
PDF
AWS Cloud Practitioner Tutorial | Edureka
Edureka!
 
PDF
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
Edureka!
 
PPTX
Google Cloud Platform (GCP)
Chetan Sharma
 
PPTX
AWS Lambda Tutorial For Beginners | What is AWS Lambda? | AWS Tutorial For Be...
Simplilearn
 
PDF
AWS 101: Introduction to AWS
Ian Massingham
 
PPTX
AWS Elastic Compute Cloud (EC2)
zekeLabs Technologies
 
PPTX
AWS Storage services
Nagesh Ramamoorthy
 
PPTX
AWS Route53
zekeLabs Technologies
 
AWS SQS SNS
Durgesh Vaishnav
 
AWS Monitoring & Logging
Jason Poley
 
Introduction to Amazon Web Services (AWS)
Garvit Anand
 
Introduction to AWS VPC, Guidelines, and Best Practices
Gary Silverman
 
AWS Connectivity, VPC Design and Security Pro Tips
Shiva Narayanaswamy
 
AWS
ARYA TM
 
Iam presentation
AWS UG PK
 
What is AWS?
Martin Yan
 
AWS Lambda
Scott Leberknight
 
Azure active directory
Raju Kumar
 
Basics AWS Presentation
Shyam Kumar
 
AWS solution Architect Associate study material
Nagesh Ramamoorthy
 
AWS Cloud Practitioner Tutorial | Edureka
Edureka!
 
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
Edureka!
 
Google Cloud Platform (GCP)
Chetan Sharma
 
AWS Lambda Tutorial For Beginners | What is AWS Lambda? | AWS Tutorial For Be...
Simplilearn
 
AWS 101: Introduction to AWS
Ian Massingham
 
AWS Elastic Compute Cloud (EC2)
zekeLabs Technologies
 
AWS Storage services
Nagesh Ramamoorthy
 
AWS Route53
zekeLabs Technologies
 

Viewers also liked (20)

ODP
Akka Finite State Machine
Knoldus Inc.
 
ODP
BDD with Cucumber
Knoldus Inc.
 
ODP
Kick-Start with SMACK Stack
Knoldus Inc.
 
ODP
Walk-through: Amazon ECS
Knoldus Inc.
 
ODP
Event sourcing with Eventuate
Knoldus Inc.
 
ODP
Deep dive into sass
Knoldus Inc.
 
ODP
Cassandra - Tips And Techniques
Knoldus Inc.
 
ODP
Introduction to Structured Streaming
Knoldus Inc.
 
ODP
Introduction To Agile
Knoldus Inc.
 
ODP
Mandrill Templates
Knoldus Inc.
 
ODP
Functional programming in Javascript
Knoldus Inc.
 
ODP
HTML5, CSS, JavaScript Style guide and coding conventions
Knoldus Inc.
 
ODP
Effective way to code in Scala
Knoldus Inc.
 
ODP
Introduction to Apache Cassandra
Knoldus Inc.
 
ODP
Introduction to BDD
Knoldus Inc.
 
PDF
Fast dataarchitecture
Knoldus Inc.
 
ODP
Introduction to Scala Macros
Knoldus Inc.
 
ODP
Introduction to Swagger
Knoldus Inc.
 
ODP
Introduction to Quasiquotes
Knoldus Inc.
 
ODP
Introduction to ScalaZ
Knoldus Inc.
 
Akka Finite State Machine
Knoldus Inc.
 
BDD with Cucumber
Knoldus Inc.
 
Kick-Start with SMACK Stack
Knoldus Inc.
 
Walk-through: Amazon ECS
Knoldus Inc.
 
Event sourcing with Eventuate
Knoldus Inc.
 
Deep dive into sass
Knoldus Inc.
 
Cassandra - Tips And Techniques
Knoldus Inc.
 
Introduction to Structured Streaming
Knoldus Inc.
 
Introduction To Agile
Knoldus Inc.
 
Mandrill Templates
Knoldus Inc.
 
Functional programming in Javascript
Knoldus Inc.
 
HTML5, CSS, JavaScript Style guide and coding conventions
Knoldus Inc.
 
Effective way to code in Scala
Knoldus Inc.
 
Introduction to Apache Cassandra
Knoldus Inc.
 
Introduction to BDD
Knoldus Inc.
 
Fast dataarchitecture
Knoldus Inc.
 
Introduction to Scala Macros
Knoldus Inc.
 
Introduction to Swagger
Knoldus Inc.
 
Introduction to Quasiquotes
Knoldus Inc.
 
Introduction to ScalaZ
Knoldus Inc.
 
Ad

Similar to Introduction to AWS IAM (13)

PPTX
cLASE 3 DE 40 Es por esoque debes teber 40 c.pptx
CarlosGil57586
 
PPTX
Identity Access Management presented by Techserverglobal
HarpalGohil4
 
PPTX
Identity Access Management by Techserverglobal.pptx
HarpalGohil4
 
PPTX
AWSM2C3.pptx
RahulDange13
 
PPTX
Aws iam best practices to live by
John Varghese
 
PPTX
Identity and access management
genesesoftware
 
PPTX
AWS Identity and access management for users
StephenEfange3
 
PPTX
Windsor AWS UG Deep dive IAM 2 - no json101
Goran Karmisevic
 
PPTX
AWS core services
Nagesh Ramamoorthy
 
PPTX
AWS deployment and management Services
Nagesh Ramamoorthy
 
PDF
Aws security-pillar
Nattawut Kongkotchawan
 
PDF
Aws security-pillar
saifam
 
PPTX
AWS Users Authentication
chandrasen Reddy
 
cLASE 3 DE 40 Es por esoque debes teber 40 c.pptx
CarlosGil57586
 
Identity Access Management presented by Techserverglobal
HarpalGohil4
 
Identity Access Management by Techserverglobal.pptx
HarpalGohil4
 
AWSM2C3.pptx
RahulDange13
 
Aws iam best practices to live by
John Varghese
 
Identity and access management
genesesoftware
 
AWS Identity and access management for users
StephenEfange3
 
Windsor AWS UG Deep dive IAM 2 - no json101
Goran Karmisevic
 
AWS core services
Nagesh Ramamoorthy
 
AWS deployment and management Services
Nagesh Ramamoorthy
 
Aws security-pillar
Nattawut Kongkotchawan
 
Aws security-pillar
saifam
 
AWS Users Authentication
chandrasen Reddy
 
Ad

More from Knoldus Inc. (20)

PPTX
Angular Hydration Presentation (FrontEnd)
Knoldus Inc.
 
PPTX
Optimizing Test Execution: Heuristic Algorithm for Self-Healing
Knoldus Inc.
 
PPTX
Self-Healing Test Automation Framework - Healenium
Knoldus Inc.
 
PPTX
Kanban Metrics Presentation (Project Management)
Knoldus Inc.
 
PPTX
Java 17 features and implementation.pptx
Knoldus Inc.
 
PPTX
Chaos Mesh Introducing Chaos in Kubernetes
Knoldus Inc.
 
PPTX
GraalVM - A Step Ahead of JVM Presentation
Knoldus Inc.
 
PPTX
Nomad by HashiCorp Presentation (DevOps)
Knoldus Inc.
 
PPTX
Nomad by HashiCorp Presentation (DevOps)
Knoldus Inc.
 
PPTX
DAPR - Distributed Application Runtime Presentation
Knoldus Inc.
 
PPTX
Introduction to Azure Virtual WAN Presentation
Knoldus Inc.
 
PPTX
Introduction to Argo Rollouts Presentation
Knoldus Inc.
 
PPTX
Intro to Azure Container App Presentation
Knoldus Inc.
 
PPTX
Insights Unveiled Test Reporting and Observability Excellence
Knoldus Inc.
 
PPTX
Introduction to Splunk Presentation (DevOps)
Knoldus Inc.
 
PPTX
Code Camp - Data Profiling and Quality Analysis Framework
Knoldus Inc.
 
PPTX
AWS: Messaging Services in AWS Presentation
Knoldus Inc.
 
PPTX
Amazon Cognito: A Primer on Authentication and Authorization
Knoldus Inc.
 
PPTX
ZIO Http A Functional Approach to Scalable and Type-Safe Web Development
Knoldus Inc.
 
PPTX
Managing State & HTTP Requests In Ionic.
Knoldus Inc.
 
Angular Hydration Presentation (FrontEnd)
Knoldus Inc.
 
Optimizing Test Execution: Heuristic Algorithm for Self-Healing
Knoldus Inc.
 
Self-Healing Test Automation Framework - Healenium
Knoldus Inc.
 
Kanban Metrics Presentation (Project Management)
Knoldus Inc.
 
Java 17 features and implementation.pptx
Knoldus Inc.
 
Chaos Mesh Introducing Chaos in Kubernetes
Knoldus Inc.
 
GraalVM - A Step Ahead of JVM Presentation
Knoldus Inc.
 
Nomad by HashiCorp Presentation (DevOps)
Knoldus Inc.
 
Nomad by HashiCorp Presentation (DevOps)
Knoldus Inc.
 
DAPR - Distributed Application Runtime Presentation
Knoldus Inc.
 
Introduction to Azure Virtual WAN Presentation
Knoldus Inc.
 
Introduction to Argo Rollouts Presentation
Knoldus Inc.
 
Intro to Azure Container App Presentation
Knoldus Inc.
 
Insights Unveiled Test Reporting and Observability Excellence
Knoldus Inc.
 
Introduction to Splunk Presentation (DevOps)
Knoldus Inc.
 
Code Camp - Data Profiling and Quality Analysis Framework
Knoldus Inc.
 
AWS: Messaging Services in AWS Presentation
Knoldus Inc.
 
Amazon Cognito: A Primer on Authentication and Authorization
Knoldus Inc.
 
ZIO Http A Functional Approach to Scalable and Type-Safe Web Development
Knoldus Inc.
 
Managing State & HTTP Requests In Ionic.
Knoldus Inc.
 

Recently uploaded (20)

PDF
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
PDF
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PPTX
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
PPTX
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PDF
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PDF
NEW-Viral>Wondershare Filmora 14.5.18.12900 Crack Free
sherryg1122g
 
PDF
MiniTool Power Data Recovery 8.8 With Crack New Latest 2025
bashirkhan333g
 
PPTX
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
PPTX
Hardware(Central Processing Unit ) CU and ALU
RizwanaKalsoom2
 
PDF
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
PDF
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
PPTX
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PPTX
ChiSquare Procedure in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
NEW-Viral>Wondershare Filmora 14.5.18.12900 Crack Free
sherryg1122g
 
MiniTool Power Data Recovery 8.8 With Crack New Latest 2025
bashirkhan333g
 
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
Hardware(Central Processing Unit ) CU and ALU
RizwanaKalsoom2
 
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
ChiSquare Procedure in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 

Introduction to AWS IAM

  • 1. Introduction to AWS IAM Abhishek Giri Software Consultant Knoldus Software LLP
  • 2. Agenda ● What is IAM? ● IAM as a service ● IAM Best Practices ● Elements of IAM policy ● UseCase ● Policy Simulator
  • 3. What is IAM? Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM enables you to securely control access to your application or product services and resources for your users. Using IAM, you can create and manage users and groups and use permissions to allow and deny their access to the resources.
  • 4. AWS: IAM as a service AWS Identity and Access Management AWS IAM roles are a web service that gives you secured "Control Access" to AWS services for your users. IAM policies specify which services/actions are allowed or denied. You attach policies to group, users, and roles, which are then subject to permissions that you define. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users can access. Policies can be granted either from AWS API programmatically or the AWS management console.
  • 5. IAM gives you following features : ● Shared access to your AWS account. ● Granular permission. ● Secure access to your AWS resources. ● Identity Information. ● Integrated with many AWS resources. ● Free to use.
  • 6. Types of Policies ● Managed Policy - Standalone policies that you can attach to multiple users, groups, and roles in your AWS account. Managed policies apply only to identities (users, groups, and roles) - not resources. ● Inline Policy - Policies that you create and manage, and that are embedded directly into a single user, group, or role. Resource- based policies are another form of inline policy.
  • 7. IAM Groups ● A collection of IAM users. ● You assign permission to group, all IAM user in the inherit those permission.
  • 8. IAM Users ● Can have username/password to login to aws console. ● Can have aws credentials for making API calls to interact with aws services. ● New IAM user have no permission to do anything, permission must be explicilty granted.
  • 9. IAM Roles / Instance profile ● The permission of an IAM role can be granted/assigned to EC2 instance. ● All AWS Sdk has buit-in way to auto discover AWS credentials on AWS EC2. -Credential file -Environmental variable -Instance profile
  • 10. IAM Policies ● When you create a IAM group,user you associate an IAM policy with it which specify the permission that you want to grant. ● IAM policies are JSON formatted document that defines AWS permission.
  • 11. Elements of policy ● Version - Version specifies the current version of the policy language. It must specify it before the statement element. In this case, our version is "2012-10-17." ● Statement - The Statement element is the main element of the policy. This element is required. The Statement element contains an array of individual statements. Each individual statement is a JSON block enclosed in braces { }. ● Effect - The Effect element is required and specifies whether the statement will result in an allow or an explicit deny. ● Action - The Action element describes the specific action or actions that will be allowed or denied. Each AWS service has its own set of actions that describe tasks that you can perform with that service. ● Resource - The Resource element specifies the object or objects that the statement covers. Statements must include either a Resource or a NotResource element. You specify a resource using an ARN. ● Principal – The Principal element specifies the identity. It is use to specify the User,AWS account that is allowed or denied acces to a resource.
  • 12. Sample JSON { "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": "s3:ListBucket", "Resource": "arn:aws:s3:::example_bucket" } }
  • 13. IAM Best Practices ● Protect the “root” account. ● Create the individual IAM user. ● Create and use groups. ● Set up a strong password policy. ● Use multifator authentication. ● Use Roles/Instance profiles. ● Rotate credentials often. ● Monitor IAM activity.
  • 14. Protect the “root” account. ● Root account in AWS has full access to any service. ● By design it permission cannot be restricted. ● Never create AWS credentials keys.
  • 15. Create the individual IAM user. ● Each user get his/her account. ● Makes managing of users easy. ● Makes defining policies of each user easy.
  • 16. Create and use groups ● Group allows you to logically define set of users. ● Groups can define different set of policies. ● Users can be part of multiple groups. They will inherit permission for both the groups.
  • 17. Set up a strong password policy. ● Users should have permission to manage their own passwords. ● You can define a strong password policy that enforces things like minimum length, complexity, periodic rotation etc.
  • 18. Use multifator authentication ● In addition to using a username and password, IAM has an option setting up a second factor.
  • 19. Use Roles/Instance profiles. ● If you have an app/script that needs to make an API call to AWS, as far as possible avoid using static access keys. ● Instead use Roles/Instance Profiles. ● AWS automatically expires the credentials.
  • 20. Rotate credentials often ● Enforce all the keys and passwords to be changed often. ● Passwords should be changed once in 90 days. ● Keys could be rotated much more often. ● All keys should have the permission to create another set of keys and delete the old ones.
  • 21. Monitor IAM activity ● AWS gives you logs for ALL IAM operations. ● Typically this will be in Cloud Trail. Logs are sent to S3 bucket you define. ● Use this information to keep a close watch on what's happening. ● Setup alerts on interesting activities.
  • 24. In the above diagram, each user has access to his/her object in the bucket. { "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Action": [ "s3:PutObject", "s3:GetObject", "s3:GetObjectVersion" ], "Resource": "arn:aws:s3:::examplebucket/${aws:username}/*" }] } Instead of attaching policies to each user, policies can be attached at the group level. After that, we can add users to that group. The following policy allows a set of Amazon S3 permissons in bucketName/${aws:username} folder. When the policy is evaluated, the policy is replaced by requested username.