SlideShare a Scribd company logo
1 of 41
IAM Secure, Are You?
Enri Peters
Schuberg Philis
Who
Principal
Can access
Action
What
Resource
When
Condition
4271 days ago
Sep 2, 2010
Preview Beta
4028 days ago
May 3, 2011
Console access
Who
Aka the
Principal
Can access
Aka the
Action
What
Aka
Resource
Read, Write, Full Control
Access Control Lists (ACLs)
53.34.19.23
AWSCloudTrailReadOnlyAcces
AWS Managed
Identity-based policy
MyOwnFancyStrictPolicy
Customer Managed
Identity-based policy
Inline policy
Identity-based policy
Permission boundaries
Session policies
Service control
policies (SCPs)
Resource-based policy
When
Aka the
Condition
Numeric condition
Date condition
String condition
...IfExists condition Boolean condition IP address condition
Variables
Tags (ABAC)
893 days ago
Dec 2, 2019
Access Analyzer
The end

More Related Content

Similar to IAM Secure Are You.pptx

A Journey to Magical Security Creatures' Land
A Journey to Magical Security Creatures' LandA Journey to Magical Security Creatures' Land
A Journey to Magical Security Creatures' Land
MongoDB
 

Similar to IAM Secure Are You.pptx (20)

A Journey to Magical Security Creatures' Land
A Journey to Magical Security Creatures' LandA Journey to Magical Security Creatures' Land
A Journey to Magical Security Creatures' Land
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptxThe Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
 
BDA309 Building Your Data Lake on AWS
BDA309 Building Your Data Lake on AWSBDA309 Building Your Data Lake on AWS
BDA309 Building Your Data Lake on AWS
 
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
 
Architecting for Greater Security - London Summit Enteprise Track RePlay
Architecting for Greater Security - London Summit Enteprise Track RePlayArchitecting for Greater Security - London Summit Enteprise Track RePlay
Architecting for Greater Security - London Summit Enteprise Track RePlay
 
Azure Storage – Foundation for Building Secure, Scalable Cloud Applications
Azure Storage – Foundation for Building Secure, Scalable Cloud ApplicationsAzure Storage – Foundation for Building Secure, Scalable Cloud Applications
Azure Storage – Foundation for Building Secure, Scalable Cloud Applications
 
Partnering to Deliver Cost Efficient and Reliable Corporate Services to Agenc...
Partnering to Deliver Cost Efficient and Reliable Corporate Services to Agenc...Partnering to Deliver Cost Efficient and Reliable Corporate Services to Agenc...
Partnering to Deliver Cost Efficient and Reliable Corporate Services to Agenc...
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
Threat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure SentinelThreat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure Sentinel
 
Windows server 2012 security Webinar
Windows server 2012 security WebinarWindows server 2012 security Webinar
Windows server 2012 security Webinar
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Serverless Data Processing on AWS - Level 300
Serverless Data Processing on AWS - Level 300Serverless Data Processing on AWS - Level 300
Serverless Data Processing on AWS - Level 300
 
Secure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPTSecure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPT
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Enterprise Network Design and Deployment
Enterprise Network Design and Deployment Enterprise Network Design and Deployment
Enterprise Network Design and Deployment
 
Top 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfTop 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdf
 
AWS _Course Content.pdf
AWS _Course Content.pdfAWS _Course Content.pdf
AWS _Course Content.pdf
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Editor's Notes

  1. Thank Martijn & Sohan And the rest Today talking about AWS IAM You might wonder who this is, This is vishnu Considered the protector of the universe
  2. Stands for Is one of AWS web services that helps you control access to AWS resources. With IAM you control who can access what and when.
  3. Developing a new cool feature Hit the button to deploy to AWS Realize you need IAM access Also realize the IAM user guide has 381 pages of documentation While doing this you will ofcourse fall asleep Spent the next day on configuring very strict / granulair policies Unsuccessful and then Be like nevermind and add too broad permissions
  4. But then you have regret when the audit comes
  5. Enri Peters 30 years old Work for Schuberg Philis Gratefull Linux and Cloud technologies I have 2 daughters and a wife and we are living in Zutphen Which is somewhere in the far east of the Netherlands
  6. I would like to start with a few did you knows
  7. When AWS launches 2006 with S3 Login with your amazon.com account AWS announced SQS, their second service. Then EC2.
  8. In 2009 / 2010 still login with your root account. But you was able to create a dedicated AWS account. And able to login in the management console. S3 -> only ACL’s not recommended anymore
  9. But then on the second of September in 2010 Programmatically add Users, groups and permission to your AWS Account
  10. Console access Ability to create users, groups of users and to attach policies to either one Support 15 AWS services Can login with IAM users
  11. What you see here is An IAM user Resource with creds and permissions associated An IAM user can represent a person or an application Access keys (MAX 2) MAX 5000.
  12. An IAM user group is a collection of IAM users. With them you can take care of easier permission management. Groups can contain many users.
  13. An IAM role is similar to an IAM user But, assumable by anyone who needs it. No long-term credentials such as a password or access keys Instead, when you assume a role, it provides you with temporary security credentials for your session
  14. When IAM did not exist Back in the days it all started with ACL’s For S3 Decide what a principal can do but very limited
  15. Then later when IAM was introduced It came with Policies for users groups and roles Its called identity-based policies JSON documents which specify the who can access what and when AWS Managed Auto update Easy to implement Example could be CloudTrailReadOnly
  16. Customer managed More control No auto update Includes versioning
  17. Embedded to the IAM identity Not reuseable No versioning
  18. What we look at Is an example of a policy In this case a permission boundary policy Lets you set the maximum permissions that an identity-based policy can grant to an IAM entity.
  19. Session policies are advanced policies that you pass as a parameter when you programmatically create a temporary session for a role or federated user.  Scope Prevent coding mistakes
  20. You can apply to your AWS organizations account They set the maximum permissions I work in a environment where we are only allow to use serverless and no EC2 etc.
  21. Attached to a resource instead of a user, group or role… Example on a queue you could specify who can access the qeueu.
  22. IAM is who can access what And this is about the when part It’s called conditions
  23. To run an instance And for ease you want to specify resource * Some context does not have the ec2:InstanceType available For example the ec2:AvailabilityZone
  24. You can use policy variables in the Resource element and in string comparisons in the Condition element. but only in the resource portion of the ARN
  25. Attribute based access control If your tag job-title does not equal to Product-Manager you are denied to the prod bucket
  26. We talked about Users Groups and Roles And all kind of policies Nowadays users and Groups are not preferred So I would like to dive in a bit deeper on Roles
  27. When you create a role you can choose a so called Trusted entity type. For example
  28. Another very common one is the AWS Account one This type of role can be assumed via the console Or programaticcaly
  29. INSERT DEMO QUIZ HERE Video with create policy + role (read only) and create queue with write only for that role arn
  30. Lets take a few seconds to recap the demo We had a role with SQS READ permissions We had a Queue with a resource policy with Send permissions for that same role As admin we have send a message on the queue Then we switched roles to the MyDemoRole which has the SQS READ policy attached I would like to ask you to raise your hand if you think polling with the assumed role will FAIL
  31. CONTINUE DEMO QUIZ HERE
  32. https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html
  33. Lock away your AWS account root user access keys Use roles (temp creds) Grant least privilege Use customer managed policies instead of inline policies Use roles for applications that run on Amazon EC2 instances Use policy conditions for extra security Monitor activity
  34. Image a scenario where it did not work To learn whether principals in accounts outside of your zone of trust (trusted organization or account) have access to assume your roles, see What is IAM Access Analyzer?.