1. Meet Core leader Women Group
Hello to all a short intro about myself.
• System Administrator (Linux & Win)
• Cisco Network Engr
• Python user
• DevOps Engr (Cloud)
• Certified Ethical Hacker v8.0
• Certified PCI DSS Implementor V3.0
• IT System Auditor
“I am a proud batanguena” joined Conduent as Information Security Analyst, Lead She loves to
read, dance and yoga during free time.
2. Meet the AWS UG PH Women Community
(Manila and Cebu 2017-2018]
6. Why women in I.T skeptical to participate in peer
to peer community based group?
7. Why women in I.T skeptical to participate in
peer to peer community based group?
8. Why women in I.T skeptical to participate in peer to
peer community based group?
9. AWS Asian Women: Increase Women
in I.T roles & Visibility
Comfort ability of
training
work setting
make a career in
technology more
attainable
inspirational - goal
10. AWS Asian Women: workforce in Cloud
security
Picture : credit to Udemy
11. Value Women in workforce : Cloud security
Directions in Information Security
Operation practices and priorities of security organization.
Able to do things from multiple perspective
drive to align Security with business strategy.
12. Ways to help us visible group community?
> Do you have a clear understandingof the
roles and what they require as skills to be hire able?
> What can you offer to the company, as
added value?
> What are the skills that you can reuse
from your previous career?
13. “With ordinary talent and extra-ordinary
perseverance All things are attainable.”
Thomas Fawell Buston
Hire able = Skills set + Certification+ level of
experience
14. AWS Women’s Group Community
PEER-TO-PEER COMMUNITIES which meet regularly
to share ideas
Answer users community questions
learn about new AWS services and best
practices.
19. 1. Principal
2. Request
3. Authentication
4. Authorization
5. Actions
6. Resources
The IAM infrastructure
20. Understanding how IAM works (Basics)
. Principal
action on an AWS resource
allow users and services to assume a role
Request
▸ Actions (or operations)
▸ Resources upon which the actions are
performed
▸ Principal informationAuthentication
you must be authenticated (signed in to
AWS) to send a request to AWS.
Authenticate from the API or CLI, you
must provide your access key and secret
key
Use MFA
Authorization
▸ By default, all requests are denied.
▸ An explicit allow overrides this
default.
▸ An explicit deny overrides any
allows.
started December 2017, collaborate with Coding Girls Manila and Cebu AWS Women’s 1st meet up Dec 2018. Successfully mentored 1 student from ICADEMY and continuous growing our AWS UG PH Women’s Manila/Cebu Community.
Empowerment, Engagement, and Education {continue}
Scholar: Catherin Ashcraft, Director of Reasearch and Senior Research Scientist for the National Centre for Women & Information technology
She identified three key issues which caused lack of women in technology-specific roles;
1. Societal influences and biases
***perception of girls not being suitable for technology-based roles is still widespread.
2. Education {school & background)
****Computer science subjects are not made compelling and engaging for girls, limiting their interest in such subjects at later year STEM-focused see a reduced female interest.
reduced female interest.
3. Workplace Systems
***Technology workplaces continue the tradition of biases against women. They often encounter these same patterns and biases in the workplace, which restricts their upward movement and further interest in the profession.
****************************
1. Societal influences and biases
2. School education
3. Workplace Systems
Be interactive with audience ask their current skills set, be able to define their certification path and level of experience on domains
Be interactive with audience ask their current skills set, be able to define their certification path and level of experience on domains
Be interactive with audience ask their current skills set, be able to define their certification path and level of experience on domains
AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources.
You use IAM to control who is authenticated(signed in) and authorized (has permissions) to use resources.
Basic IAM Policy and Security Features Outside IAM AWS EC2
CreateUser
DeleteUser
GetUser
UpdateUser
Resources: After AWS approves the actions in your request, those actions can be performed on the related resources within your account.
An entity that exists within a service.