Chapitre4 AWS Cloud Security (1)
Chapitre4 AWS Cloud Security (1)
Topics
• AWS shared responsibility model
• AWS Identity and Access Management (IAM)
• Securing a new AWS account
• Securing accounts
• Securing data on AWS
• Working to ensure compliance
Section 2: AWS Identity and Access Management (IAM) IAM is a no-cost AWS account
feature
-Use IAM to manage access to AWS resources
• Define fine-grained access rights –
• Who can access the resource
• Which resources can be accessed and what can the user do to the resource
• How resources can be accessed
2. IAM Authentication
Programmatic Access: Via AWS CLI/SDK using an Access Key ID and a Secret Access
Key.
AWS Console Access: Requires an account ID, username, password, and optionally
MFA (Multi-Factor Authentication) for enhanced security.
3. IAM Authorization
IAM Policies: Define what a user, group, or role can do.
Permissions Hierarchy:
All permissions are implicitly denied by default.
• If something is explicitly denied, it is never allowed.
An explicit allow is required for access.
An explicit deny always overrides an allow.
5. IAM Roles
Provide temporary access to AWS resources without creating new users.
e can have permissions policies attached to it
Use cases:
An AWS service (e.g., EC2) accessing S3 via a role.
A user from another AWS account assuming a role to access resources.
7. Key Takeaways
IAM enables fine-grained permission management using JSON policies.
IAM users, groups, and roles are the main entities.
IAM roles provide a secure way to delegate temporary access.
AWS Artifact est un service d'AWS qui fournit un accès à des rapports de conformité, des
certifications et des accords de sécurité liés aux services AWS. Il aide les entreprises à répondre aux
exigences réglementaires et à assurer la conformité de leur utilisation d'AWS.
• Is a resource for compliance-related information
• Provide access to security and compliance reports, and select online agreements
AWS security compliance programs provide information about the policies, processes, and controls
that are established and operated by AWS
· Aider les clients à comprendre comment AWS sécurise l'infrastructure cloud.
· Fournir des rapports d'audit et des certifications pour prouver la conformité aux standards de
l'industrie.