SlideShare a Scribd company logo
1 of 29
Identity and Access
Management
Anjani Phuyal
Global CTO, Genese Software Solution
● Introduction to IAM
● IAM Users and Groups
● IAM Policies
● IAM Roles
● Live demonstrations
Scope of this session
● A web service that helps us securely control access to AWS
resources.
● Allows to create and manage AWS users and groups, and use
permissions to allow and deny their access to AWS resources.
● Control who is authenticated (signed in) and authorized (has
permissions) to use resources
● IAM is offered at no additional charge.
Features of IAM
● Centralized control of AWS account
● Shared access to other AWS account
● Granular permissions
● Identity Federation
● Multi-Factor Authentication
● Temporary access for users or applications
● Password Rotation Policy
Users
● An entity that we create in AWS to represent the person or
application that uses it to interact with AWS.
● Users can access AWS in different ways depending on
credentials.
○ Console Password
○ Access Keys
○ SSH keys for use with CodeCommit
Types of Users
● Root User: Email we use when creating an AWS account
● IAM User:
○ Instead of sharing root credentials, we create individual
IAM users.
○ Each user has their own password.
○ Users can have access keys for programmatic access.
● Federated User:
○ Allow users who already have passwords elsewhere
○ Identities from Corporate Directory or OpenID providers
Groups
● Collection of IAM users
● Groups let us specify permissions for multiple users
● We attach permission policies to the group
● Any user in a group automatically has the permissions that are assigned to
the group
● A group can contain many users, and a user can belong to multiple groups.
● Groups cannot be nested
Policies
● An entity that, when attached to an identity or resource, defines their
permissions.
● Policies are stored in AWS as JSON documents that defines the
permissions for specific identity (users) or resource (S3 Bucket).
● We can attach policies in users, groups or roles.
● AWS evaluates these policies when a principal entity (user or role)
makes a request.
● IAM’s Policy Evaluation Logic denies all requests by default, so
successful actions/operations have to be explicitly allowed by the admin
within the user and resource policies.
● An explicit allow in policy overrides the default deny but cannot
overrides explicit deny.
Types of policies
● Identity-based policies:
○ Attached to an IAM user, group, or role.
○ Types of identity-based policies:
■ AWS Managed Policies
● Standalone policy that is created and administered by AWS.
● Designed to provide permissions for many common use cases.
■ Customer Managed Policies
● Standalone policies that we administer in our own AWS account.
● We can edit customer managed policies unlike AWS managed
policies
Types of policies
■ Inline Policies
● Policy that’s embedded in a particular user, group or role
● Useful to maintain a strict one-to-one relationship between policy
and a particular entity.
● If an entity(which contains an inline policy) is deleted, then inline
policy is automatically deleted.
Types of policies
■ Job Function Policy
● AWS managed policies
● Designed to closely align to common job functions in the IT industry
● Consolidate permissions for many services into a single policy
● Job Functions like Database Administrator, Network Administrator,
System Administrator etc.
● Resource-based Policy
○ Resource-based policies are attached to a resource.
○ We can attach resource-based policies to Amazon S3 buckets or an IAM
Role trust policy.
○ Resource based policies are inline only, not managed.
Sample Policy
● Sample Identity Based Policy
Sample Policy
● Sample Resource Based Policy
Elements of Policy Document
● Version:
○ Specifies the version of the policy language
○ Mostly we use latest version: 2012-10-17.
● Statement
○ Main and required element for a policy
○ A list of multiple statements that define permissions.
○ Each individual statement includes:
■ Sid: Description of the statement
■ Effect: Specifies whether the statement results in an
allow or an explicit deny
■ Principal:
● Indicate the account/user/role to which we would
like to allow or deny access.
Elements of Policy Document
■ NotPrincipal:
● Specify an exception to a list of principals
● Use this element to deny access to all principals
except the one named in the NotPrincipal
element
■ Action:
● Include a list of actions that the policy allows or
denies.
● Each AWS service has its own set of actions that
describe tasks that we can perform with that
service.
Elements of Policy Document
■ NotAction
● Explicitly matches everything except the
specified list of actions
■ Resource:
● Specify a list of resources to which the action
apply
■ NotResource:
● Explicitly matches everything except the
specified list of resources
Elements of Policy Document
■ Condition:
● Specify the circumstances under which the policy
grants permission
● Use condition operators (equal, less than, etc.) to
match the condition in the policy against values
in the request
● "Condition" : { "StringEquals" : { "aws:username"
: "genese" }}
Elements of Policy Document
■ Condition:
● Some available conditions keys
○ aws:CurrentTime
○ aws:MultiFactorAuthPresent
○ aws:SourceIp
○ aws:SourceAccount
○ aws:SourceArn
○ aws:RequestedRegion
Elements of Policy Document
■ Condition:
● Some Condition Operators
○ StringEquals
○ StringNotEquals
○ NumericLessThan
○ NumericLessThanEquals
○ NumericGreaterThan
○ NumericGreaterThanEquals
○ IPAddress
○ NotIpAddress
Roles : Terms and Concepts
● Role
○ IAM identity that has specific set of permissions.
○ Similar to users
○ Intended to be assumable by anyone who needs it.
○ When you assume a role, it provides you with temporary
security credentials for your role session.
Roles: Common Scenarios
● Two ways to use a role:
○ Interactively in the IAM console
○ Programmatically with the AWS CLI or AWS API.
● Common scenarios for which we will use IAM Role
○ Providing Access to an AWS Service
○ Providing Access Across AWS Accounts
○ Providing Access to Third-Party AWS Accounts
○ Providing Access Through Identity Federation
Role: Trust Policy
● Policy document that defines who is
allowed to assume the role.
● The trusted entity is included in the
“Principal” element of policy
document.
Role for AWS Services
● Allows AWS Services to perform actions on our behalf.
● Also called service roles .
● Role that a service assumes to perform action on our behalf.
Role for Another account
● Allows entities in other accounts to perform actions in our
account.
● With these roles, we can establish a trust relationships
between our trusting account and other AWS trusted
accounts.
● The trusting account owns the resource to be accessed and
trusted account contains the users
Role for Identity Providers
● Use IAM identity providers instead of creating IAM users.
● Allows users federated by specified external web identity
(such as Facebook, Google) or OpenID Connect(OIDC)
compatible IdP or SAML 2.0 based IdP to assume the role.
● Useful to create a mobile app or web application that requires
access to AWS resources.
Using Roles
● Granting a User Permissions to Switch Roles: assume role
● Granting Permissions to Pass a Role to a Service: pass role
● Switching Role/Assuming a role
○ Console
○ AWS CLI
○ AWS SDK
IAM Best Practices
● Create Individual Users, avoid using root credentials
● Grant Minimum Privileges
● Manage Permissions with Groups
● Restrict Privileged access further with conditions
● Configure a strong password policy
● Rotate Security Credentials Regularly
● Enable MFA for privileged users
● Use IAM roles to share access
Demo
● Let’s do a demo:
ANY QUERIES???

More Related Content

What's hot

What's hot (6)

JQuery
JQueryJQuery
JQuery
 
Policy Ninja
Policy NinjaPolicy Ninja
Policy Ninja
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
AWS IAM policies in plain english
AWS IAM policies in plain english AWS IAM policies in plain english
AWS IAM policies in plain english
 
Andrew May - Simple S3 Security
Andrew May - Simple S3 SecurityAndrew May - Simple S3 Security
Andrew May - Simple S3 Security
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 

Similar to Identity and access management

Similar to Identity and access management (20)

Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAM
 
Controlling Access to your Resources
Controlling Access to your ResourcesControlling Access to your Resources
Controlling Access to your Resources
 
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
 
Amazon services iam
Amazon services   iamAmazon services   iam
Amazon services iam
 
AWS core services
AWS core servicesAWS core services
AWS core services
 
AWS deployment and management Services
AWS deployment and management ServicesAWS deployment and management Services
AWS deployment and management Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
AWS Identity and access Managment
AWS Identity and access ManagmentAWS Identity and access Managment
AWS Identity and access Managment
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Understanding the Critical Building Blocks of AWS Identity and Governance
Understanding the Critical Building Blocks of AWS Identity and GovernanceUnderstanding the Critical Building Blocks of AWS Identity and Governance
Understanding the Critical Building Blocks of AWS Identity and Governance
 
External Security Services Round: Security Week at the San Francisco Loft
External Security Services Round: Security Week at the San Francisco LoftExternal Security Services Round: Security Week at the San Francisco Loft
External Security Services Round: Security Week at the San Francisco Loft
 
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
 
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
 
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
 
Identify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS Security
 
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
 
AWSM2C3.pptx
AWSM2C3.pptxAWSM2C3.pptx
AWSM2C3.pptx
 
Joel Schuweiler_AWS IAM Identity Center (Single Sign On).pptx
Joel Schuweiler_AWS IAM Identity Center (Single Sign On).pptxJoel Schuweiler_AWS IAM Identity Center (Single Sign On).pptx
Joel Schuweiler_AWS IAM Identity Center (Single Sign On).pptx
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 

More from genesesoftware

CI/CD using CodeCommit CodeBuild CodeDeploy CodePipeline
CI/CD using CodeCommit CodeBuild  CodeDeploy  CodePipelineCI/CD using CodeCommit CodeBuild  CodeDeploy  CodePipeline
CI/CD using CodeCommit CodeBuild CodeDeploy CodePipeline
genesesoftware
 

More from genesesoftware (9)

Genese Cloud Academy Presentation to Computer Science & Information Technolog...
Genese Cloud Academy Presentation to Computer Science & Information Technolog...Genese Cloud Academy Presentation to Computer Science & Information Technolog...
Genese Cloud Academy Presentation to Computer Science & Information Technolog...
 
Pathway to creating jobs in ict by building stronger collaboration province 3
Pathway to creating jobs in ict by building stronger collaboration   province 3Pathway to creating jobs in ict by building stronger collaboration   province 3
Pathway to creating jobs in ict by building stronger collaboration province 3
 
Pathway to creating jobs in ict by building stronger collaboration province 1
Pathway to creating jobs in ict by building stronger collaboration   province 1Pathway to creating jobs in ict by building stronger collaboration   province 1
Pathway to creating jobs in ict by building stronger collaboration province 1
 
Session On Cloud Computing At Kings College
Session On Cloud Computing At Kings CollegeSession On Cloud Computing At Kings College
Session On Cloud Computing At Kings College
 
Webinar On Career In Cloud Computing
Webinar On Career In Cloud ComputingWebinar On Career In Cloud Computing
Webinar On Career In Cloud Computing
 
Presentation For Startups at Google Business Group Summit
Presentation For Startups at Google Business Group SummitPresentation For Startups at Google Business Group Summit
Presentation For Startups at Google Business Group Summit
 
Presentation at Fintech Summit
Presentation at Fintech SummitPresentation at Fintech Summit
Presentation at Fintech Summit
 
CI/CD using CodeCommit CodeBuild CodeDeploy CodePipeline
CI/CD using CodeCommit CodeBuild  CodeDeploy  CodePipelineCI/CD using CodeCommit CodeBuild  CodeDeploy  CodePipeline
CI/CD using CodeCommit CodeBuild CodeDeploy CodePipeline
 
Aws serverless architecture
Aws serverless architectureAws serverless architecture
Aws serverless architecture
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Identity and access management

  • 1. Identity and Access Management Anjani Phuyal Global CTO, Genese Software Solution
  • 2. ● Introduction to IAM ● IAM Users and Groups ● IAM Policies ● IAM Roles ● Live demonstrations Scope of this session
  • 3. ● A web service that helps us securely control access to AWS resources. ● Allows to create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. ● Control who is authenticated (signed in) and authorized (has permissions) to use resources ● IAM is offered at no additional charge.
  • 4. Features of IAM ● Centralized control of AWS account ● Shared access to other AWS account ● Granular permissions ● Identity Federation ● Multi-Factor Authentication ● Temporary access for users or applications ● Password Rotation Policy
  • 5. Users ● An entity that we create in AWS to represent the person or application that uses it to interact with AWS. ● Users can access AWS in different ways depending on credentials. ○ Console Password ○ Access Keys ○ SSH keys for use with CodeCommit
  • 6. Types of Users ● Root User: Email we use when creating an AWS account ● IAM User: ○ Instead of sharing root credentials, we create individual IAM users. ○ Each user has their own password. ○ Users can have access keys for programmatic access. ● Federated User: ○ Allow users who already have passwords elsewhere ○ Identities from Corporate Directory or OpenID providers
  • 7. Groups ● Collection of IAM users ● Groups let us specify permissions for multiple users ● We attach permission policies to the group ● Any user in a group automatically has the permissions that are assigned to the group ● A group can contain many users, and a user can belong to multiple groups. ● Groups cannot be nested
  • 8. Policies ● An entity that, when attached to an identity or resource, defines their permissions. ● Policies are stored in AWS as JSON documents that defines the permissions for specific identity (users) or resource (S3 Bucket). ● We can attach policies in users, groups or roles. ● AWS evaluates these policies when a principal entity (user or role) makes a request. ● IAM’s Policy Evaluation Logic denies all requests by default, so successful actions/operations have to be explicitly allowed by the admin within the user and resource policies. ● An explicit allow in policy overrides the default deny but cannot overrides explicit deny.
  • 9. Types of policies ● Identity-based policies: ○ Attached to an IAM user, group, or role. ○ Types of identity-based policies: ■ AWS Managed Policies ● Standalone policy that is created and administered by AWS. ● Designed to provide permissions for many common use cases. ■ Customer Managed Policies ● Standalone policies that we administer in our own AWS account. ● We can edit customer managed policies unlike AWS managed policies
  • 10. Types of policies ■ Inline Policies ● Policy that’s embedded in a particular user, group or role ● Useful to maintain a strict one-to-one relationship between policy and a particular entity. ● If an entity(which contains an inline policy) is deleted, then inline policy is automatically deleted.
  • 11. Types of policies ■ Job Function Policy ● AWS managed policies ● Designed to closely align to common job functions in the IT industry ● Consolidate permissions for many services into a single policy ● Job Functions like Database Administrator, Network Administrator, System Administrator etc. ● Resource-based Policy ○ Resource-based policies are attached to a resource. ○ We can attach resource-based policies to Amazon S3 buckets or an IAM Role trust policy. ○ Resource based policies are inline only, not managed.
  • 12. Sample Policy ● Sample Identity Based Policy
  • 13. Sample Policy ● Sample Resource Based Policy
  • 14. Elements of Policy Document ● Version: ○ Specifies the version of the policy language ○ Mostly we use latest version: 2012-10-17. ● Statement ○ Main and required element for a policy ○ A list of multiple statements that define permissions. ○ Each individual statement includes: ■ Sid: Description of the statement ■ Effect: Specifies whether the statement results in an allow or an explicit deny ■ Principal: ● Indicate the account/user/role to which we would like to allow or deny access.
  • 15. Elements of Policy Document ■ NotPrincipal: ● Specify an exception to a list of principals ● Use this element to deny access to all principals except the one named in the NotPrincipal element ■ Action: ● Include a list of actions that the policy allows or denies. ● Each AWS service has its own set of actions that describe tasks that we can perform with that service.
  • 16. Elements of Policy Document ■ NotAction ● Explicitly matches everything except the specified list of actions ■ Resource: ● Specify a list of resources to which the action apply ■ NotResource: ● Explicitly matches everything except the specified list of resources
  • 17. Elements of Policy Document ■ Condition: ● Specify the circumstances under which the policy grants permission ● Use condition operators (equal, less than, etc.) to match the condition in the policy against values in the request ● "Condition" : { "StringEquals" : { "aws:username" : "genese" }}
  • 18. Elements of Policy Document ■ Condition: ● Some available conditions keys ○ aws:CurrentTime ○ aws:MultiFactorAuthPresent ○ aws:SourceIp ○ aws:SourceAccount ○ aws:SourceArn ○ aws:RequestedRegion
  • 19. Elements of Policy Document ■ Condition: ● Some Condition Operators ○ StringEquals ○ StringNotEquals ○ NumericLessThan ○ NumericLessThanEquals ○ NumericGreaterThan ○ NumericGreaterThanEquals ○ IPAddress ○ NotIpAddress
  • 20. Roles : Terms and Concepts ● Role ○ IAM identity that has specific set of permissions. ○ Similar to users ○ Intended to be assumable by anyone who needs it. ○ When you assume a role, it provides you with temporary security credentials for your role session.
  • 21. Roles: Common Scenarios ● Two ways to use a role: ○ Interactively in the IAM console ○ Programmatically with the AWS CLI or AWS API. ● Common scenarios for which we will use IAM Role ○ Providing Access to an AWS Service ○ Providing Access Across AWS Accounts ○ Providing Access to Third-Party AWS Accounts ○ Providing Access Through Identity Federation
  • 22. Role: Trust Policy ● Policy document that defines who is allowed to assume the role. ● The trusted entity is included in the “Principal” element of policy document.
  • 23. Role for AWS Services ● Allows AWS Services to perform actions on our behalf. ● Also called service roles . ● Role that a service assumes to perform action on our behalf.
  • 24. Role for Another account ● Allows entities in other accounts to perform actions in our account. ● With these roles, we can establish a trust relationships between our trusting account and other AWS trusted accounts. ● The trusting account owns the resource to be accessed and trusted account contains the users
  • 25. Role for Identity Providers ● Use IAM identity providers instead of creating IAM users. ● Allows users federated by specified external web identity (such as Facebook, Google) or OpenID Connect(OIDC) compatible IdP or SAML 2.0 based IdP to assume the role. ● Useful to create a mobile app or web application that requires access to AWS resources.
  • 26. Using Roles ● Granting a User Permissions to Switch Roles: assume role ● Granting Permissions to Pass a Role to a Service: pass role ● Switching Role/Assuming a role ○ Console ○ AWS CLI ○ AWS SDK
  • 27. IAM Best Practices ● Create Individual Users, avoid using root credentials ● Grant Minimum Privileges ● Manage Permissions with Groups ● Restrict Privileged access further with conditions ● Configure a strong password policy ● Rotate Security Credentials Regularly ● Enable MFA for privileged users ● Use IAM roles to share access