AWS IAM Intro 2016 08 03
AWS IAM Intro 2016 08 03
• JSON documents }, {
"Effect": "Allow",
"Action": [
• can be assigned
"s3:ListBucket",
"s3:GetBucketLocation"],
"Resource":
• Generically
– Cornell AD group: CIT-123456789012-xyz
– AWS role: shib-xyz
• assigned any policy you wish
Cornell IAM-related Policies
• root account
– MFA enabled
– no access keys
– no everyday use
• use of IAM users (extremely) limited
• use Shibboleth-mapped roles instead of IAM users
– Two-Step Login (Duo) required
• strong IAM password policy
– when IAM users cannot be avoided
Cornell IAM-related Ideals likely to be
policy soon
• rotate access keys for IAM users
• use Shibboleth for temporary access keys
– Using Shibboleth for AWS API and CLI access
(Cornell Cloud Tech Blog)
Security Outside of IAM
IAM controls access to create and manage resources
– does not control identity and access within those resources
Resources
– AWS re:Invent 2015 Security presentations
– Cornell Standard AWS Account Configurations
– Cornell Cloudification Services Wiki
– Cornell Cloudification Tech Blog