AWS Global Infra, IAM - Done
AWS Global Infra, IAM - Done
Availability Zone - One or more data centers close to each other, that counted as one
Availability zone.
AWS Identity and Access Management (IAM) is a global service that helps you
securely control access to AWS resources. You use IAM to control who is
authenticated (signed in) and authorized (has permissions) to use resources.
When you first create an AWS account, you begin with a single sign-in identity that
has complete access to all AWS services and resources in the account. This identity
is called the AWS account root user and is accessed by signing in with the email
address and password that you used to create the account. It is strongly
recommended that you do not use the root user for your everyday tasks, even the
administrative ones. Instead, adhere to the best practice of using the root user only
to create your first IAM user. Then securely lock away the root user credentials and
use them to perform only a few account and service management tasks.
Key terminology
3
Exercise
● Create an IAM user
● Create a policy with appropriate permissions
● Create a group and attach the policy to the group
● Finally, add the IAM user to the group
Create a policy
Create a custom policy under policies > create policy
Create a group
Create a group under groups > create new group
Finally add users to group by selecting the group and group actions > add users to
group
4
IAM role
An IAM role is similar to a user, in that it is an AWS identity with permission policies
that determine what the identity can and cannot do in AWS. However, instead of
being uniquely associated with one person, a role is intended to be assumable by
anyone who needs it. Also, a role does not have standard long-term credentials
(password or access keys) associated with it. Instead, if a user assumes a role,
temporary security credentials are created dynamically and provided to the user.
Create a role
Create a new role under roles > create role
Now you can attach that role to an EC2 instance and access the AWS resources
using AWS CLI.
Identity Providers
If you already manage user identities outside of AWS, you can use IAM identity
providers instead of creating IAM users in your AWS account. With an identity
provider (IdP), you can manage your user identities outside of AWS and give these
5
external user identities permissions to use AWS resources in your account. This is
useful if your organization already has its own identity system, such as a corporate
user directory. It is also useful if you are creating a mobile app or web application
that requires access to AWS resources.
Billing Alarm
● Login as root user
● Billing > Billing preferences > Receive Billing Alerts > Turn on
● CloudWatch > Billing > Create Alarm
○ Metric Name: EstimatedCharges
○ Threshold: EstimatedCharges > 1 USD
○ Actions: Send message to SNS topic
Exam tips
https://<account_id/alias>.signin.aws.amazon.com/console
https://mscaws.signin.aws.amazon.com/console
Read:
https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html