Assistant Professor
Department of Computer Science
Kristu Jayanti College
Bangalore
D Muthulakshmi M.Sc.,M.Phil.,
IAM in AWS
Presented by
November 29, 2024 1
Java Applet
 IAM stands for Identity and Access Management in AWS (Amazon Web Services). It allows you to manage
access to AWS services and resources securely.
 With IAM, you can create users, groups, roles, and policies to control who can access what in your AWS
environment.
Key Concepts:
1.Users: Individuals or applications that need access to AWS resources.
2.Groups: A collection of IAM users. You can assign permissions to a group, and all users in that group inherit
those permissions.
3.Roles: AWS entities that define a set of permissions. Unlike users, roles are assumed by entities like AWS
services or other accounts.
4.Policies: Documents that define permissions in JSON format. Policies can be attached to users, groups, or
roles.
Example Scenario:
Use Case: Suppose you have a web application hosted on AWS, and you want to ensure that only certain
users can access the S3 bucket where application logs are stored.
1.Create Users:
•Create IAM users for your developers, such as dev1, dev2, etc.
2.Create a Group:
•Create a group named LogAccessGroup and add the developer users to this group.
3.Define a Policy:
•Create a policy that allows access to the S3 bucket. For example:
json
Copy code
{ "Version": "2012-10-17", "Statement": [
{ "Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::my-app-logs/*" } ] }
4.Attach the policy to the group name.
.
Now, any user in the LogAccessGroup can access the
logs stored in the specified S3 bucket, while others
without this group membership will be denied
access.
s
 AWS offers several identity services that help you manage access to resources securely. Here are the key
identity services:
1. AWS Identity and Access Management (IAM)
•Purpose: Manage users, groups, roles, and permissions.
•Key Features:
• Create and manage IAM users and groups.
• Define permissions using policies.
• Use roles for applications and services to access AWS resources securely.
2. AWS Single Sign-On (SSO)
•Purpose: Simplify access to multiple AWS accounts and business applications.
•Key Features:
• Centralized management of user access across AWS accounts.
• Integration with existing identity providers (e.g., Microsoft Active Directory).
• User-friendly portal for accessing applications and AWS services.
3. AWS Cognito
•Purpose: Manage user authentication and access for web and mobile apps.
•Key Features:
• User sign-up, sign-in, and access control.
• Social identity provider integration (e.g., Google, Facebook).
• Federated authentication allowing users to sign in with existing credentials.
4. AWS Directory Service
•Purpose: Manage Microsoft Active Directory in the cloud.
•Key Features:
• Fully managed Active Directory (AWS Managed Microsoft AD).
• Simple AD for lightweight directory services.
• AD Connector to connect your on-premises AD to AWS.
5. AWS Resource Access Manager (RAM)
•Purpose: Share your resources across AWS accounts securely.
•Key Features:
• Share resources like VPC subnets and transit gateways with other accounts.
• Simplify resource management in multi-account environments.
.
6. AWS Organizations
•Purpose: Manage multiple AWS accounts from a single location.
•Key Features:
• Consolidate billing across accounts.
• Apply Service Control Policies (SCPs) to manage permissions across accounts.
• Organize accounts into organizational units (OUs) for better management.
7. AWS Identity Provider (IdP)
•Purpose: Enable federated authentication and authorization.
•Key Features:
• Use third-party identity providers to manage user access.
• Support for SAML 2.0 and OpenID Connect for single sign-on
 Security and compliance in AWS are critical for protecting data and ensuring that your applications meet
regulatory requirements. AWS provides a variety of tools, services to help you maintain a secure environment.
1. Shared Responsibility Model
•AWS's Role: AWS manages security of the cloud infrastructure (hardware, software, networking).
•Customer's Role: Customers manage security in the cloud, including data, applications, and access
management.
2. Identity and Access Management (IAM)
•Use IAM to manage user access and permissions.
•Implement least privilege access and use roles for services and applications.
3. Data Protection
•Encryption: Use AWS Key Management Service (KMS) for managing encryption keys. Encrypt data at rest (e.g.,
S3, RDS) and in transit (TLS/SSL).
•AWS Secrets Manager: Securely store and manage sensitive information, such as API keys and database
credentials.
4. Network Security
•VPC (Virtual Private Cloud): Isolate your resources in a virtual network.
•Security Groups and NACLs: Use these to control inbound and outbound traffic to your instances.
•AWS WAF (Web Application Firewall): Protect web applications from common web exploits.
5. Monitoring and Logging
•AWS CloudTrail: Monitor API calls and user activity for compliance and security auditing.
•Amazon CloudWatch: Collect and monitor logs and metrics in real-time for performance and security insights.
•AWS Config: Track AWS resource configurations and compliance with your policies.
6. Compliance Certifications
•AWS complies with various global standards and regulations, such as:
• GDPR
• HIPAA
• PCI DSS
• ISO 27001
•AWS provides compliance reports and certifications through the AWS Artifact service.
7. Incident Response
•AWS Security Hub: Centralized view of security alerts and compliance status.
•AWS GuardDuty: Threat detection service that continuously monitors for malicious activity and unauthorized
behavior.
8. Security Best Practices
•Regularly audit IAM policies and access controls.
•Implement multi-factor authentication (MFA) for users.
•Keep software and systems updated with the latest security patches.
•Conduct regular security assessments and penetration testing.
 Multi-Factor Authentication (MFA) in AWS (Amazon Web Services) is a security feature that adds an extra
layer of protection to your AWS accounts and resources.
 It requires users to provide two or more verification factors to gain access, making it more difficult for
unauthorized users to access your account even if they have your password.
Key Features of AWS MFA
1.Two or More Factors: MFA requires something you know (like your password) and something you have
(like a physical device or an app) to authenticate.
2.MFA Devices: AWS supports various MFA devices, including:
1. Virtual MFA: Applications like Google Authenticator or Authy can generate time-based one-time
passwords (TOTPs).
2. Hardware MFA: Physical devices like key fobs that generate one-time codes.
3. SMS MFA: A code sent to your mobile device via SMS (though this is less secure than other
methods).
• Enhanced Security: By requiring a second form of verification, MFA significantly reduces the risk of
unauthorized access, especially if credentials are compromised.
• Configurable: MFA can be enabled for individual IAM users, root accounts, or specific roles, allowing for
granular control over security.
Management Console and API: Users can set up and manage MFA through the AWS Management Console,
AWS CLI, or SDKs
•.
1. Credentials
•Definition: Credentials are the means by which users authenticate their identity to access systems and resources.
•Types:
• Passwords: The most common form of authentication.
• Tokens: Time-based or event-based one-time passwords (e.g., from MFA apps).
• Certificates: Digital certificates that validate identities.
• Biometrics: Fingerprints, facial recognition, etc.
•Management: Credentials should be stored securely, regularly updated, and monitored for unauthorized access.
2. Security Policies
•Definition: Formalized guidelines that dictate how users, groups, and roles interact with resources.
•Components:
• Access Control Policies: Define who can access what resources and under what conditions.
• Authentication Policies: Specify how users verify their identities (e.g., password requirements, MFA).
• Data Protection Policies: Outline how sensitive data should be handled, stored, and transmitted.
• Incident Response Policies: Provide procedures for responding to security breaches or data loss.
•Importance: Security policies help enforce compliance, protect sensitive information, and establish a clear
framework for managing security risks.
3. IAM Abilities
•Granular Access Control: IAM allows for precise control over who can access resources and what actions they can
perform.
•Role-Based Access Control (RBAC): Users can be assigned roles that define permissions based on their job
functions, simplifying management.
•Audit and Compliance: IAM tools often include monitoring and reporting capabilities to help organizations track
access patterns and comply with regulations.
•Self-Service Features: Users may have the ability to manage their own passwords and permissions, reducing
administrative overhead.
4. Limitations
•Complexity: As the number of users, roles, and permissions grows, managing IAM configurations can become
complex and prone to errors.
•Overlapping Permissions: Users in multiple roles or groups might have conflicting permissions, leading to potential
security risks.
•Human Error: Misconfigurations or mistakes in assigning roles can result in unauthorized access or data breaches.
•Scalability Challenges: As organizations grow, maintaining an effective IAM strategy can become increasingly
challenging.
PHYSICAL SECUTRITY IN AWS
 Data Center Access Control: Access to AWS data centers is restricted to authorized personnel only. This includes
multiple layers of authentication, such as biometric scanning, access cards, and security guards.
 Surveillance: AWS employs extensive video surveillance systems to monitor all physical access points and
sensitive areas within data centers, ensuring continuous monitoring and recording.
 Environmental Controls: Data centers are equipped with fire suppression systems, flood controls, and
temperature monitoring to maintain optimal operating conditions and protect against environmental hazards
 Physical Security Audits: AWS conducts regular audits and assessments of physical security measures to
identify vulnerabilities and ensure compliance with industry standards and regulations.
 Secure Locations: AWS data centers are located in geographically diverse regions to minimize risk from
localized events such as natural disasters.
 Redundant Systems: To ensure high availability and reliability, AWS implements redundant power and cooling
systems, as well as backup infrastructure.
 Employee Training: AWS employees undergo training in security protocols and best practices to ensure they
understand the importance of physical security.
AWS compliance initiatives are designed to help customers meet various regulatory and industry standards while using
AWS services. Here are some key initiatives and frameworks.
1.Compliance Programs:
1. AWS Compliance Programs: AWS adheres to numerous compliance frameworks, including ISO 27001, SOC 1,
2, and 3, PCI DSS, HIPAA, and FedRAMP. These programs provide customers with assurance regarding AWS's
security practices.
2.Shared Responsibility Model:
1. AWS operates on a shared responsibility model, which delineates the security responsibilities of AWS (the
cloud provider) and the customer. AWS is responsible for the security of the cloud infrastructure, while
customers are responsible for securing their applications and data.
3.AWS Artifact:
1. AWS Artifact is a portal where customers can access compliance reports, AWS's compliance certifications, and
agreements. This tool helps customers maintain compliance by providing necessary documentation.
November 29, 2024 17
Java Applet
Thank You

Identity and Access Management-CLOUD.pptx

  • 1.
    Assistant Professor Department ofComputer Science Kristu Jayanti College Bangalore D Muthulakshmi M.Sc.,M.Phil., IAM in AWS Presented by November 29, 2024 1 Java Applet
  • 2.
     IAM standsfor Identity and Access Management in AWS (Amazon Web Services). It allows you to manage access to AWS services and resources securely.  With IAM, you can create users, groups, roles, and policies to control who can access what in your AWS environment. Key Concepts: 1.Users: Individuals or applications that need access to AWS resources. 2.Groups: A collection of IAM users. You can assign permissions to a group, and all users in that group inherit those permissions. 3.Roles: AWS entities that define a set of permissions. Unlike users, roles are assumed by entities like AWS services or other accounts. 4.Policies: Documents that define permissions in JSON format. Policies can be attached to users, groups, or roles.
  • 3.
    Example Scenario: Use Case:Suppose you have a web application hosted on AWS, and you want to ensure that only certain users can access the S3 bucket where application logs are stored. 1.Create Users: •Create IAM users for your developers, such as dev1, dev2, etc. 2.Create a Group: •Create a group named LogAccessGroup and add the developer users to this group. 3.Define a Policy: •Create a policy that allows access to the S3 bucket. For example: json Copy code { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "s3:GetObject", "Resource": "arn:aws:s3:::my-app-logs/*" } ] } 4.Attach the policy to the group name. . Now, any user in the LogAccessGroup can access the logs stored in the specified S3 bucket, while others without this group membership will be denied access. s
  • 5.
     AWS offersseveral identity services that help you manage access to resources securely. Here are the key identity services: 1. AWS Identity and Access Management (IAM) •Purpose: Manage users, groups, roles, and permissions. •Key Features: • Create and manage IAM users and groups. • Define permissions using policies. • Use roles for applications and services to access AWS resources securely. 2. AWS Single Sign-On (SSO) •Purpose: Simplify access to multiple AWS accounts and business applications. •Key Features: • Centralized management of user access across AWS accounts. • Integration with existing identity providers (e.g., Microsoft Active Directory). • User-friendly portal for accessing applications and AWS services.
  • 6.
    3. AWS Cognito •Purpose:Manage user authentication and access for web and mobile apps. •Key Features: • User sign-up, sign-in, and access control. • Social identity provider integration (e.g., Google, Facebook). • Federated authentication allowing users to sign in with existing credentials. 4. AWS Directory Service •Purpose: Manage Microsoft Active Directory in the cloud. •Key Features: • Fully managed Active Directory (AWS Managed Microsoft AD). • Simple AD for lightweight directory services. • AD Connector to connect your on-premises AD to AWS. 5. AWS Resource Access Manager (RAM) •Purpose: Share your resources across AWS accounts securely. •Key Features: • Share resources like VPC subnets and transit gateways with other accounts. • Simplify resource management in multi-account environments. .
  • 7.
    6. AWS Organizations •Purpose:Manage multiple AWS accounts from a single location. •Key Features: • Consolidate billing across accounts. • Apply Service Control Policies (SCPs) to manage permissions across accounts. • Organize accounts into organizational units (OUs) for better management. 7. AWS Identity Provider (IdP) •Purpose: Enable federated authentication and authorization. •Key Features: • Use third-party identity providers to manage user access. • Support for SAML 2.0 and OpenID Connect for single sign-on
  • 8.
     Security andcompliance in AWS are critical for protecting data and ensuring that your applications meet regulatory requirements. AWS provides a variety of tools, services to help you maintain a secure environment. 1. Shared Responsibility Model •AWS's Role: AWS manages security of the cloud infrastructure (hardware, software, networking). •Customer's Role: Customers manage security in the cloud, including data, applications, and access management. 2. Identity and Access Management (IAM) •Use IAM to manage user access and permissions. •Implement least privilege access and use roles for services and applications. 3. Data Protection •Encryption: Use AWS Key Management Service (KMS) for managing encryption keys. Encrypt data at rest (e.g., S3, RDS) and in transit (TLS/SSL). •AWS Secrets Manager: Securely store and manage sensitive information, such as API keys and database credentials.
  • 9.
    4. Network Security •VPC(Virtual Private Cloud): Isolate your resources in a virtual network. •Security Groups and NACLs: Use these to control inbound and outbound traffic to your instances. •AWS WAF (Web Application Firewall): Protect web applications from common web exploits. 5. Monitoring and Logging •AWS CloudTrail: Monitor API calls and user activity for compliance and security auditing. •Amazon CloudWatch: Collect and monitor logs and metrics in real-time for performance and security insights. •AWS Config: Track AWS resource configurations and compliance with your policies. 6. Compliance Certifications •AWS complies with various global standards and regulations, such as: • GDPR • HIPAA • PCI DSS • ISO 27001 •AWS provides compliance reports and certifications through the AWS Artifact service.
  • 10.
    7. Incident Response •AWSSecurity Hub: Centralized view of security alerts and compliance status. •AWS GuardDuty: Threat detection service that continuously monitors for malicious activity and unauthorized behavior. 8. Security Best Practices •Regularly audit IAM policies and access controls. •Implement multi-factor authentication (MFA) for users. •Keep software and systems updated with the latest security patches. •Conduct regular security assessments and penetration testing.  Multi-Factor Authentication (MFA) in AWS (Amazon Web Services) is a security feature that adds an extra layer of protection to your AWS accounts and resources.  It requires users to provide two or more verification factors to gain access, making it more difficult for unauthorized users to access your account even if they have your password.
  • 12.
    Key Features ofAWS MFA 1.Two or More Factors: MFA requires something you know (like your password) and something you have (like a physical device or an app) to authenticate. 2.MFA Devices: AWS supports various MFA devices, including: 1. Virtual MFA: Applications like Google Authenticator or Authy can generate time-based one-time passwords (TOTPs). 2. Hardware MFA: Physical devices like key fobs that generate one-time codes. 3. SMS MFA: A code sent to your mobile device via SMS (though this is less secure than other methods). • Enhanced Security: By requiring a second form of verification, MFA significantly reduces the risk of unauthorized access, especially if credentials are compromised. • Configurable: MFA can be enabled for individual IAM users, root accounts, or specific roles, allowing for granular control over security. Management Console and API: Users can set up and manage MFA through the AWS Management Console, AWS CLI, or SDKs •.
  • 13.
    1. Credentials •Definition: Credentialsare the means by which users authenticate their identity to access systems and resources. •Types: • Passwords: The most common form of authentication. • Tokens: Time-based or event-based one-time passwords (e.g., from MFA apps). • Certificates: Digital certificates that validate identities. • Biometrics: Fingerprints, facial recognition, etc. •Management: Credentials should be stored securely, regularly updated, and monitored for unauthorized access. 2. Security Policies •Definition: Formalized guidelines that dictate how users, groups, and roles interact with resources. •Components: • Access Control Policies: Define who can access what resources and under what conditions. • Authentication Policies: Specify how users verify their identities (e.g., password requirements, MFA). • Data Protection Policies: Outline how sensitive data should be handled, stored, and transmitted. • Incident Response Policies: Provide procedures for responding to security breaches or data loss. •Importance: Security policies help enforce compliance, protect sensitive information, and establish a clear framework for managing security risks.
  • 14.
    3. IAM Abilities •GranularAccess Control: IAM allows for precise control over who can access resources and what actions they can perform. •Role-Based Access Control (RBAC): Users can be assigned roles that define permissions based on their job functions, simplifying management. •Audit and Compliance: IAM tools often include monitoring and reporting capabilities to help organizations track access patterns and comply with regulations. •Self-Service Features: Users may have the ability to manage their own passwords and permissions, reducing administrative overhead. 4. Limitations •Complexity: As the number of users, roles, and permissions grows, managing IAM configurations can become complex and prone to errors. •Overlapping Permissions: Users in multiple roles or groups might have conflicting permissions, leading to potential security risks. •Human Error: Misconfigurations or mistakes in assigning roles can result in unauthorized access or data breaches. •Scalability Challenges: As organizations grow, maintaining an effective IAM strategy can become increasingly challenging.
  • 15.
    PHYSICAL SECUTRITY INAWS  Data Center Access Control: Access to AWS data centers is restricted to authorized personnel only. This includes multiple layers of authentication, such as biometric scanning, access cards, and security guards.  Surveillance: AWS employs extensive video surveillance systems to monitor all physical access points and sensitive areas within data centers, ensuring continuous monitoring and recording.  Environmental Controls: Data centers are equipped with fire suppression systems, flood controls, and temperature monitoring to maintain optimal operating conditions and protect against environmental hazards  Physical Security Audits: AWS conducts regular audits and assessments of physical security measures to identify vulnerabilities and ensure compliance with industry standards and regulations.  Secure Locations: AWS data centers are located in geographically diverse regions to minimize risk from localized events such as natural disasters.  Redundant Systems: To ensure high availability and reliability, AWS implements redundant power and cooling systems, as well as backup infrastructure.  Employee Training: AWS employees undergo training in security protocols and best practices to ensure they understand the importance of physical security.
  • 16.
    AWS compliance initiativesare designed to help customers meet various regulatory and industry standards while using AWS services. Here are some key initiatives and frameworks. 1.Compliance Programs: 1. AWS Compliance Programs: AWS adheres to numerous compliance frameworks, including ISO 27001, SOC 1, 2, and 3, PCI DSS, HIPAA, and FedRAMP. These programs provide customers with assurance regarding AWS's security practices. 2.Shared Responsibility Model: 1. AWS operates on a shared responsibility model, which delineates the security responsibilities of AWS (the cloud provider) and the customer. AWS is responsible for the security of the cloud infrastructure, while customers are responsible for securing their applications and data. 3.AWS Artifact: 1. AWS Artifact is a portal where customers can access compliance reports, AWS's compliance certifications, and agreements. This tool helps customers maintain compliance by providing necessary documentation.
  • 17.
    November 29, 202417 Java Applet Thank You