by Joy Chatterjee, Sr. Technical Product Manager, AWS
We take an in-depth look at the AWS Identity and Access Management (IAM) policy language. We start with the basics of the policy language and how to create and attach policies to IAM users, groups, and roles. As we dive deeper, we explore policy variables, conditions, and other tools to help you author least privilege policies. Throughout the session, we cover some common use cases, such as granting a user secure access to an Amazon S3 bucket or to launch an Amazon EC2 instance of a specific type. Level 300
by Brigid Johnson, Product Management Manager, AWS
How to Use IAM Roles to Grant Access to AWS: Customers use IAM roles to delegate access to services, applications, accounts, and federated users using temporary credentials. We will start by defining use cases for IAM roles, tools to use IAM roles in your account, and techniques to manage role permissions. We will cover how customers can use roles to grant access to AWS. Using demonstrations, we will learn how to monitor roles across accounts, grant cross account access, and scope down permissions for a particular entity. This session will cover how to use roles for developers building applications on AWS and for administrators controlling and monitoring access. Level 300
This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources.
by Apurv Awasthi, Sr. Technical Product Manager, AWS
This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources. We also cover the concept of trust relationships, and how you can use them to delegate access to your AWS resources. This session covers also covers IAM best practices that can help improve your security posture. We cover how to manage IAM users and roles, and their security credentials. We also explain ways for how you can securely manage you AWS access keys. Using common use cases, we demonstrate how to choose between using IAM users or IAM roles. Finally, we explore how to set permissions to grant least privilege access control in one or more of your AWS accounts. Level 100
This document provides an overview of AWS Identity and Access Management (IAM) and how it can be used to control access to AWS resources. IAM enables control of who can access AWS accounts and what actions they can perform by creating users, groups, and roles with permissions. The document discusses IAM concepts and common use cases, and includes demonstrations of creating IAM users and groups and assigning permissions through policies.
The document outlines 10 best practices for managing identity and access management (IAM) on AWS:
1. Create individual users instead of sharing credentials.
2. Configure a strong password policy and regularly rotate credentials.
3. Enable multi-factor authentication for privileged users.
4. Manage permissions with groups and grant least privilege.
5. Use IAM roles to allow cross-account access and provide access to EC2 instances and federated users.
6. Enable AWS CloudTrail logging to monitor API activity.
7. Reduce use of root credentials where possible.
The document provides explanations and examples for each best practice.
IAM Deep Dive - Custom IAM Policies with ConditionsBryant Poush
This document provides an overview of using conditions with IAM policies to customize access. It begins with examples of basic IAM policy structures and progresses to using conditions to limit actions based on factors like region, instance type, volume type and size. The document demonstrates how to structure policies with condition blocks and test policies to ensure the intended access is allowed or denied.
The document provides an overview of AWS Identity and Access Management (IAM) best practices and common use cases. It discusses 10 best practices for IAM including creating individual users, configuring strong password policies, rotating security credentials regularly, enabling MFA for privileged users, managing permissions with groups, granting least privilege, using IAM roles to share access, using IAM roles for EC2 instances, enabling AWS CloudTrail for auditing, and reducing use of root credentials. It also covers using tag-based access control and managing multiple AWS accounts.
by Brigid Johnson, Product Management Manager, AWS
How to Use IAM Roles to Grant Access to AWS: Customers use IAM roles to delegate access to services, applications, accounts, and federated users using temporary credentials. We will start by defining use cases for IAM roles, tools to use IAM roles in your account, and techniques to manage role permissions. We will cover how customers can use roles to grant access to AWS. Using demonstrations, we will learn how to monitor roles across accounts, grant cross account access, and scope down permissions for a particular entity. This session will cover how to use roles for developers building applications on AWS and for administrators controlling and monitoring access. Level 300
This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources.
by Apurv Awasthi, Sr. Technical Product Manager, AWS
This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources. We also cover the concept of trust relationships, and how you can use them to delegate access to your AWS resources. This session covers also covers IAM best practices that can help improve your security posture. We cover how to manage IAM users and roles, and their security credentials. We also explain ways for how you can securely manage you AWS access keys. Using common use cases, we demonstrate how to choose between using IAM users or IAM roles. Finally, we explore how to set permissions to grant least privilege access control in one or more of your AWS accounts. Level 100
This document provides an overview of AWS Identity and Access Management (IAM) and how it can be used to control access to AWS resources. IAM enables control of who can access AWS accounts and what actions they can perform by creating users, groups, and roles with permissions. The document discusses IAM concepts and common use cases, and includes demonstrations of creating IAM users and groups and assigning permissions through policies.
The document outlines 10 best practices for managing identity and access management (IAM) on AWS:
1. Create individual users instead of sharing credentials.
2. Configure a strong password policy and regularly rotate credentials.
3. Enable multi-factor authentication for privileged users.
4. Manage permissions with groups and grant least privilege.
5. Use IAM roles to allow cross-account access and provide access to EC2 instances and federated users.
6. Enable AWS CloudTrail logging to monitor API activity.
7. Reduce use of root credentials where possible.
The document provides explanations and examples for each best practice.
IAM Deep Dive - Custom IAM Policies with ConditionsBryant Poush
This document provides an overview of using conditions with IAM policies to customize access. It begins with examples of basic IAM policy structures and progresses to using conditions to limit actions based on factors like region, instance type, volume type and size. The document demonstrates how to structure policies with condition blocks and test policies to ensure the intended access is allowed or denied.
The document provides an overview of AWS Identity and Access Management (IAM) best practices and common use cases. It discusses 10 best practices for IAM including creating individual users, configuring strong password policies, rotating security credentials regularly, enabling MFA for privileged users, managing permissions with groups, granting least privilege, using IAM roles to share access, using IAM roles for EC2 instances, enabling AWS CloudTrail for auditing, and reducing use of root credentials. It also covers using tag-based access control and managing multiple AWS accounts.
The document outlines 10 best practices for managing identity and access management (IAM) on AWS: 1) Create individual users, 2) Configure a strong password policy, 3) Rotate security credentials regularly, 4) Enable multi-factor authentication for privileged users, 5) Manage permissions with groups, 6) Grant least privilege, 7) Use IAM roles to share access, 8) Use IAM roles for Amazon EC2 instances, 9) Enable AWS CloudTrail for auditing API calls, and 10) Reduce or remove use of the root account. The document provides explanations and examples for implementing each best practice.
AWS Windsor User Group - June 7th 2018 - Amazon Web Services IAMBrandon Wells
Hi Everyone!
Here's the slide presentation from our last meeting (07/06/2018).
We did a 101 level overview of AWS Identity and Access Management. The goal was to enable you to create more secure AWS environments & architectures and provide you with IAM best practices.
Presentation from AWS Worldwide Public Sector team's conference Building and Securing Applications in the Cloud (http://aws.amazon.com/campaigns/building-securing-applications-cloud/).
Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM enables you to securely control access to your application or product services and resources for your users.
The document provides an overview of mastering AWS Identity and Access Management (IAM) access control policies. It discusses policy basics like specifying actions, resources, principals, and conditions. It demonstrates example policies for allowing access to specific AWS services like EC2, S3, and Lambda. It also covers best practices for managing policies and provides demonstrations of policy configurations for common use cases in EC2.
The document provides an overview of using conditions with IAM policies to customize access. It reviews IAM policy structure, shows examples of limiting access by instance type, region, volume type, and more. It emphasizes testing policies thoroughly and debugging when access is denied. The examples demonstrate how to structure policies to allow or deny actions based on condition evaluations.
by Apurv Awasthi, Sr. Technical Product Manager, AWS
This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources. We also cover the concept of trust relationships, and how you can use them to delegate access to your AWS resources. This session covers also covers IAM best practices that can help improve your security posture. We cover how to manage IAM users and roles, and their security credentials. We also explain ways for how you can securely manage you AWS access keys. Using common use cases, we demonstrate how to choose between using IAM users or IAM roles. Finally, we explore how to set permissions to grant least privilege access control in one or more of your AWS accounts. Level 100
AWS Identity and Access Management (IAM) allows you to securely control access to AWS resources. IAM controls who can be authenticated and authorized to use resources by managing users, groups, roles, and their permissions. IAM supports single-factor, multi-factor, and two-factor authentication to verify identities. Authorization occurs after authentication and provides permissions to access resources. IAM helps create and manage users, groups, roles, and their permissions to govern access to AWS services.
This document discusses federated access to AWS resources using temporary security credentials. It describes how users in other AWS accounts or identity stores can be provided access to resources in an AWS account. Common use cases include delegating access to team members or third parties. The document outlines how federation works using sessions generated by AWS Security Token Service (STS). It provides examples of proxy-based and SAML-based federation using STS operations like GetFederationToken and AssumeRoleWithSAML. Web identity federation via AssumeRoleWithWebIdentity with external providers like Login with Amazon is also covered.
This session is focused on diving into the AWS IAM policy categories to understand the differences, learn how the policy evaluation logic works, and go over some best practices. We will then walk through how to use permission boundaries to truly delegate administration in AWS.
AWS Identity and Access Management and Consolidated BillingAmazon Web Services
This document summarizes an AWS webinar about IAM (Identity and Access Management) and consolidated billing. The webinar covered IAM user and group management, access policies, identity federation, and how consolidated billing allows billing for multiple AWS accounts to be combined. Identity federation allows users authenticated by a company's system to be granted temporary AWS credentials. Consolidated billing enables centralized billing management and potential volume discounts by aggregating usage across accounts.
Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017Amazon Web Services
Are you interested in becoming an expert in managing access to your AWS resources? Have you ever wondered how to best scope down permissions for least privilege access? Do you have multiple AWS accounts and need to know how to manage access to resources centrally? In this session, we take an in-depth look at AWS Identity and Access Management (IAM) and AWS Organizations. You will learn how to quickly create IAM policies to manage fine-grained access to your resources. Throughout the session, we will cover common use cases, such as how to grant a user access to an Amazon S3 bucket or permissions to launch an Amazon EC2 instance of a specific type. You will also learn how to create and use Service Control Policies (SCPs) through Organizations to manage AWS service use across all your accounts centrally.
This document provides an overview of becoming an expert at using IAM policies to control access to AWS resources. It discusses the key components of IAM policies including principals, actions, resources, and conditions. It also covers best practices for authoring, testing, and debugging policies. The document demonstrates how to create a policy that allows launching EC2 instances in specific regions and of specific types. It also shows how to decode the EC2 authorization message to help debug access issues.
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
Identity and Access Management (IAM) is first step towards AWS cloud adoption because in the cloud, first you grant access and only then can you provision infrastructure (the opposite approach of on-premises). In this session, you will learn how to define fine-grained access to AWS resources via users, roles, and groups; design privileged user and multi-factor authentication mechanisms; and operate IAM at scale.
Level: 100
Speaker: Don Edwards - Sr. Technical Delivery Manager, AWS
IAM allows users to create and manage identities and control access to AWS resources. Key aspects of IAM include groups, policies, roles, and users. Groups are collections of users that can be assigned permissions via policies. Policies define permissions and can be identity-based or resource-based. Roles allow assuming a temporary identity to access AWS services.
This document discusses various topics related to AWS Identity and Access Management (IAM), including:
1. An overview of IAM roles, policies, and the Security Token Service (STS), as well as a discussion on compliance and security.
2. Details about upcoming meetup topics on Virtual Private Cloud (VPC) networking and AWS Organizations.
3. Examples and explanations of IAM policies, roles, resource-based vs user-based policies, policy variables, Amazon Resource Names (ARNs), and other IAM concepts.
4. A demonstration of custom login URLs and switching roles in the AWS Management Console.
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Amazon Web Services
Learn about best practices on how to secure your AWS environment with AWS Identity and Access Management (IAM). We will discuss how you best create access policies; manage security credentials (i.e., access keys, password, multi factor authentication (MFA) devices etc); how to set up least privilege; minimizing the use of your root account etc.
The document outlines 10 best practices for managing identity and access management (IAM) on AWS: 1) Create individual users, 2) Configure a strong password policy, 3) Rotate security credentials regularly, 4) Enable multi-factor authentication for privileged users, 5) Manage permissions with groups, 6) Grant least privilege, 7) Use IAM roles to share access, 8) Use IAM roles for Amazon EC2 instances, 9) Enable AWS CloudTrail for auditing API calls, and 10) Reduce or remove use of the root account. The document provides explanations and examples for implementing each best practice.
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS OrganizationsAmazon Web Services
Are you interested in becoming an expert in managing access to your AWS resources? Have you ever wondered how to best scope down permissions for least privilege access? Do you have multiple AWS accounts and need to know how to manage access to resources centrally? In this session, we take an in-depth look at AWS Identity and Access Management (IAM) and AWS Organizations. You will learn how to quickly create IAM policies to manage fine-grained access to your resources. Throughout the session, we will cover common use cases, such as how to grant a user access to an Amazon S3 bucket or permissions to launch an Amazon EC2 instance of a specific type. You will also learn how to create and use Service Control Policies (SCPs) through Organizations to manage AWS service use across all your accounts centrally.
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or LessAmazon Web Services
This document provides a summary of an AWS session on becoming an IAM policy expert in 60 minutes or less. It covers key IAM policy concepts like principal, action, resource, and condition elements. Examples are given for each element to show how policies can be used to control access to AWS services like EC2, S3, and IAM. The session also demonstrates how to use policy variables and debug policies. Attendees would learn tips and tricks for common use cases through demos of limiting EC2 instance types and using conditions.
The document outlines 10 best practices for managing identity and access management (IAM) on AWS: 1) Create individual users, 2) Configure a strong password policy, 3) Rotate security credentials regularly, 4) Enable multi-factor authentication for privileged users, 5) Manage permissions with groups, 6) Grant least privilege, 7) Use IAM roles to share access, 8) Use IAM roles for Amazon EC2 instances, 9) Enable AWS CloudTrail for auditing API calls, and 10) Reduce or remove use of the root account. The document provides explanations and examples for implementing each best practice.
AWS Windsor User Group - June 7th 2018 - Amazon Web Services IAMBrandon Wells
Hi Everyone!
Here's the slide presentation from our last meeting (07/06/2018).
We did a 101 level overview of AWS Identity and Access Management. The goal was to enable you to create more secure AWS environments & architectures and provide you with IAM best practices.
Presentation from AWS Worldwide Public Sector team's conference Building and Securing Applications in the Cloud (http://aws.amazon.com/campaigns/building-securing-applications-cloud/).
Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM enables you to securely control access to your application or product services and resources for your users.
The document provides an overview of mastering AWS Identity and Access Management (IAM) access control policies. It discusses policy basics like specifying actions, resources, principals, and conditions. It demonstrates example policies for allowing access to specific AWS services like EC2, S3, and Lambda. It also covers best practices for managing policies and provides demonstrations of policy configurations for common use cases in EC2.
The document provides an overview of using conditions with IAM policies to customize access. It reviews IAM policy structure, shows examples of limiting access by instance type, region, volume type, and more. It emphasizes testing policies thoroughly and debugging when access is denied. The examples demonstrate how to structure policies to allow or deny actions based on condition evaluations.
by Apurv Awasthi, Sr. Technical Product Manager, AWS
This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources. We also cover the concept of trust relationships, and how you can use them to delegate access to your AWS resources. This session covers also covers IAM best practices that can help improve your security posture. We cover how to manage IAM users and roles, and their security credentials. We also explain ways for how you can securely manage you AWS access keys. Using common use cases, we demonstrate how to choose between using IAM users or IAM roles. Finally, we explore how to set permissions to grant least privilege access control in one or more of your AWS accounts. Level 100
AWS Identity and Access Management (IAM) allows you to securely control access to AWS resources. IAM controls who can be authenticated and authorized to use resources by managing users, groups, roles, and their permissions. IAM supports single-factor, multi-factor, and two-factor authentication to verify identities. Authorization occurs after authentication and provides permissions to access resources. IAM helps create and manage users, groups, roles, and their permissions to govern access to AWS services.
This document discusses federated access to AWS resources using temporary security credentials. It describes how users in other AWS accounts or identity stores can be provided access to resources in an AWS account. Common use cases include delegating access to team members or third parties. The document outlines how federation works using sessions generated by AWS Security Token Service (STS). It provides examples of proxy-based and SAML-based federation using STS operations like GetFederationToken and AssumeRoleWithSAML. Web identity federation via AssumeRoleWithWebIdentity with external providers like Login with Amazon is also covered.
This session is focused on diving into the AWS IAM policy categories to understand the differences, learn how the policy evaluation logic works, and go over some best practices. We will then walk through how to use permission boundaries to truly delegate administration in AWS.
AWS Identity and Access Management and Consolidated BillingAmazon Web Services
This document summarizes an AWS webinar about IAM (Identity and Access Management) and consolidated billing. The webinar covered IAM user and group management, access policies, identity federation, and how consolidated billing allows billing for multiple AWS accounts to be combined. Identity federation allows users authenticated by a company's system to be granted temporary AWS credentials. Consolidated billing enables centralized billing management and potential volume discounts by aggregating usage across accounts.
Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017Amazon Web Services
Are you interested in becoming an expert in managing access to your AWS resources? Have you ever wondered how to best scope down permissions for least privilege access? Do you have multiple AWS accounts and need to know how to manage access to resources centrally? In this session, we take an in-depth look at AWS Identity and Access Management (IAM) and AWS Organizations. You will learn how to quickly create IAM policies to manage fine-grained access to your resources. Throughout the session, we will cover common use cases, such as how to grant a user access to an Amazon S3 bucket or permissions to launch an Amazon EC2 instance of a specific type. You will also learn how to create and use Service Control Policies (SCPs) through Organizations to manage AWS service use across all your accounts centrally.
This document provides an overview of becoming an expert at using IAM policies to control access to AWS resources. It discusses the key components of IAM policies including principals, actions, resources, and conditions. It also covers best practices for authoring, testing, and debugging policies. The document demonstrates how to create a policy that allows launching EC2 instances in specific regions and of specific types. It also shows how to decode the EC2 authorization message to help debug access issues.
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
Identity and Access Management (IAM) is first step towards AWS cloud adoption because in the cloud, first you grant access and only then can you provision infrastructure (the opposite approach of on-premises). In this session, you will learn how to define fine-grained access to AWS resources via users, roles, and groups; design privileged user and multi-factor authentication mechanisms; and operate IAM at scale.
Level: 100
Speaker: Don Edwards - Sr. Technical Delivery Manager, AWS
IAM allows users to create and manage identities and control access to AWS resources. Key aspects of IAM include groups, policies, roles, and users. Groups are collections of users that can be assigned permissions via policies. Policies define permissions and can be identity-based or resource-based. Roles allow assuming a temporary identity to access AWS services.
This document discusses various topics related to AWS Identity and Access Management (IAM), including:
1. An overview of IAM roles, policies, and the Security Token Service (STS), as well as a discussion on compliance and security.
2. Details about upcoming meetup topics on Virtual Private Cloud (VPC) networking and AWS Organizations.
3. Examples and explanations of IAM policies, roles, resource-based vs user-based policies, policy variables, Amazon Resource Names (ARNs), and other IAM concepts.
4. A demonstration of custom login URLs and switching roles in the AWS Management Console.
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Amazon Web Services
Learn about best practices on how to secure your AWS environment with AWS Identity and Access Management (IAM). We will discuss how you best create access policies; manage security credentials (i.e., access keys, password, multi factor authentication (MFA) devices etc); how to set up least privilege; minimizing the use of your root account etc.
The document outlines 10 best practices for managing identity and access management (IAM) on AWS: 1) Create individual users, 2) Configure a strong password policy, 3) Rotate security credentials regularly, 4) Enable multi-factor authentication for privileged users, 5) Manage permissions with groups, 6) Grant least privilege, 7) Use IAM roles to share access, 8) Use IAM roles for Amazon EC2 instances, 9) Enable AWS CloudTrail for auditing API calls, and 10) Reduce or remove use of the root account. The document provides explanations and examples for implementing each best practice.
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS OrganizationsAmazon Web Services
Are you interested in becoming an expert in managing access to your AWS resources? Have you ever wondered how to best scope down permissions for least privilege access? Do you have multiple AWS accounts and need to know how to manage access to resources centrally? In this session, we take an in-depth look at AWS Identity and Access Management (IAM) and AWS Organizations. You will learn how to quickly create IAM policies to manage fine-grained access to your resources. Throughout the session, we will cover common use cases, such as how to grant a user access to an Amazon S3 bucket or permissions to launch an Amazon EC2 instance of a specific type. You will also learn how to create and use Service Control Policies (SCPs) through Organizations to manage AWS service use across all your accounts centrally.
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or LessAmazon Web Services
This document provides a summary of an AWS session on becoming an IAM policy expert in 60 minutes or less. It covers key IAM policy concepts like principal, action, resource, and condition elements. Examples are given for each element to show how policies can be used to control access to AWS services like EC2, S3, and IAM. The session also demonstrates how to use policy variables and debug policies. Attendees would learn tips and tricks for common use cases through demos of limiting EC2 instance types and using conditions.
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS OrganizationsAmazon Web Services
Are you interested in becoming an expert in managing access to your AWS resources? Have you ever wondered how to best scope down permissions for least privilege access? Do you have multiple AWS accounts and need to know how to manage access to resources centrally? In this session, we take an in-depth look at AWS Identity and Access Management (IAM) and AWS Organizations. You will learn how to quickly create IAM policies to manage fine-grained access to your resources. Throughout the session, we will cover common use cases, such as how to grant a user access to an Amazon S3 bucket or permissions to launch an Amazon EC2 instance of a specific type. You will also learn how to create and use Service Control Policies (SCPs) through Organizations to manage AWS service use across all your accounts centrally.
This document discusses limiting Amazon EC2 instance types that a user can start. It provides an example policy that attempts to limit starting an EC2 instance except for t2.* instance types. The policy would be created as a managed policy and attached to an IAM user. Then the expected behavior is demonstrated.
Mastering Access Control Policies (SEC302) | AWS re:Invent 2013Amazon Web Services
This document provides an overview of mastering access control policies in AWS. It discusses goals of understanding how to secure AWS resources and learn the policy language. It then covers key aspects of identity and access management (IAM) including why IAM is important, how it provides granular control, and the anatomy of the policy language. Specific examples are given for policy elements like principal, action, resource, and conditions. It also demonstrates how to use policy variables and provides examples of locking down access to Amazon EC2 instances and DynamoDB tables.
As organisations’ cloud environments continue to scale and grow, how do you ensure that access to resources are being managed securely? How do you scope permissions to achieve least-privilege access control across your AWS environment? This webinar answers these questions, delving into the AWS Identity and Access Management (IAM) web service and looking at how it can help you securely control access to AWS resources.
We take an in-depth look at the AWS Identity and Access Management (IAM) policy language. We start with the basics of the policy language and how to create and attach policies to IAM users, groups, and roles. As we dive deeper, we explore policy variables, conditions, and other tools to help you author least privilege policies. Throughout the session, we cover some common use cases, such as granting a user secure access to an Amazon S3 bucket or to launch an Amazon EC2 instance of a specific type.
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...Amazon Web Services
Are you interested in learning how to control access to your AWS resources? Have you ever wondered how to best scope down permissions to achieve least privilege permissions access control? If your answer to these questions is "yes," this session is for you. We take an in-depth look at the AWS Identity and Access Management (IAM) policy language. We start with the basics of the policy language and how to create and attach policies to IAM users, groups, and roles. As we dive deeper, we explore policy variables, conditions, and other tools to help you author least privilege policies. Throughout the session, we cover some common use cases, such as granting a user secure access to an Amazon S3 bucket or to launch an Amazon EC2 instance of a specific type.
This document provides an overview of AWS Identity and Access Management (IAM) access control policies, including:
- The goals of understanding the IAM policy language, common tasks, and doing a lab demonstration.
- An explanation of the basic components of a IAM policy including statements, actions, resources, principals, and conditions.
- Examples of specifying principals, actions, resources, and conditions in policy statements.
- Details on policy variables and resource-based policies attached directly to AWS services like S3 buckets.
- An invitation to ask questions and move to the lab portion of the demonstration.
TIB Academy Offers best AWS training in bangalore. this tutorial contains the following aspects,
security mind map
identity and access management
IAM policies
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014Amazon Web Services
If your business runs entirely on AWS, your AWS account is one of your most critical assets. Just as you might run an intrusion detection system in your on-premises network, you should monitor activity in your AWS account to detect abnormal behavior. This session walks you through leveraging unique capabilities in AWS that you can use to detect and respond to changes in your environment.
This document discusses IAM access control policies for AWS resources. It begins with goals of understanding how to secure AWS resources using policies and learning tips for common policy tasks. The presentation then dives into details of the policy language, including the anatomy of a statement with the principal, action, resource, and condition elements. It provides examples of specifying principals, actions, resources, and conditions. It also covers policy variables and managing policies through the IAM console. The presentation concludes with demonstrations of EC2 and Lambda policies.
Identify and Access Management: The First Step in AWS SecurityAmazon Web Services
IAM is first in the Security CAF because in the cloud first you grant access and only then can you provision infrastructure (the opposite of on-prem). In this session we’ll cover how to define fine grained access to AWS resources via users, roles and groups; designing privileged user & multi-factor authentication mechanisms and how to operate IAM at scale.
SRV334-Making Things Right with AWS Config Rules and AWS LambdaAmazon Web Services
Custom rules created with AWS Config and AWS Lambda enables organizations to inspect, assess, and remediate changes to AWS resources. These tools provide the development speed and flexibility required for your team to quickly start and finish a job before it becomes an issue for your client. In this workshop, you practice using AWS Lambda to design and implement the AWS Config rules that you think an organization should have ready at a moment’s notice before their next client contacts them about an issue.
0. Create individual users with unique credentials and individual permissions to grant least privilege. Manage permissions with groups and further restrict privileged access with conditions. Enable AWS CloudTrail to log API calls. Configure strong password policies and regularly rotate credentials, enabling MFA for privileged users. Use IAM roles to delegate access within and across accounts. Reduce use of root credentials.
Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...Amazon Web Services
This workshop provides a decoder ring and brief lecture showcasing many methods you can use to protect, inspect, and monitor the security of your valuable digital assets. We expand on the Amazon S3 re:Invent deep-dive session with a hands-on lab showcasing Amazon S3 storage management, monitoring, and security capabilities. Amazon S3 and Amazon Glacier experts are available to dive deep into Amazon S3 architecture, performance, and security optimization. In the hands-on lab, we walk through a customer scenario: finding and correcting security and architecture weaknesses in a pre-setup environment, using Amazon S3 management features, AWS Cloud Trail, and Amazon Macie.
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...Amazon Web Services
The document provides best practices for managing security operations in AWS. It discusses key aspects of the AWS shared responsibility model including that AWS manages security of the cloud while customers are responsible for security in the cloud. It also covers identity and access management best practices such as creating individual users, granting least privilege, using groups to manage permissions, restricting privileged access with conditions, enabling auditing with CloudTrail, configuring strong password policies and rotating credentials regularly. The document provides an overview of key certification programs and compliance offerings from AWS.
(SEC303) Mastering Access Control Policies | AWS re:Invent 2014Amazon Web Services
If you have ever wondered how best to scope down permissions in your account, this in-depth look at the AWS Access Control Policy language is for you. We start with the basics of the policy language and how to create policies for users and groups. We look at how to use policy variables to simplify policy management. Finally, we cover some common use cases, such as granting a user secure access to an Amazon S3 bucket, allowing an IAM user to manage their own credentials and passwords, and more.
Anders can perform EC2 actions
}
]
}
Permissions assigned to Anders granting him permission
to perform any EC2 action on resources tagged with
Project=Blue
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS OrganizationsAmazon Web Services
Are you interested in becoming an expert in managing access to your AWS resources? Have you ever wondered how to best scope down permissions for least privilege access? Do you have multiple AWS accounts and need to know how to manage access to resources centrally? In this session, we take an in-depth look at AWS Identity and Access Management (IAM) and AWS Organizations. You will learn how to quickly create IAM policies to manage fine-grained access to your resources. Throughout the session, we will cover common use cases, such as how to grant a user access to an Amazon S3 bucket or permissions to launch an Amazon EC2 instance of a specific type. You will also learn how to create and use Service Control Policies (SCPs) through Organizations to manage AWS service use across all your accounts centrally.
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
1) The document discusses building a minimum viable product (MVP) using Amazon Web Services (AWS).
2) It provides an example of an MVP for an omni-channel messenger platform that was built from 2017 to connect ecommerce stores to customers via web chat, Facebook Messenger, WhatsApp, and other channels.
3) The founder discusses how they started with an MVP in 2017 with 200 ecommerce stores in Hong Kong and Taiwan, and have since expanded to over 5000 clients across Southeast Asia using AWS for scaling.
This document discusses pitch decks and fundraising materials. It explains that venture capitalists will typically spend only 3 minutes and 44 seconds reviewing a pitch deck. Therefore, the deck needs to tell a compelling story to grab their attention. It also provides tips on tailoring different types of decks for different purposes, such as creating a concise 1-2 page teaser, a presentation deck for pitching in-person, and a more detailed read-only or fundraising deck. The document stresses the importance of including key information like the problem, solution, product, traction, market size, plans, team, and ask.
This document discusses building serverless web applications using AWS services like API Gateway, Lambda, DynamoDB, S3 and Amplify. It provides an overview of each service and how they can work together to create a scalable, secure and cost-effective serverless application stack without having to manage servers or infrastructure. Key services covered include API Gateway for hosting APIs, Lambda for backend logic, DynamoDB for database needs, S3 for static content, and Amplify for frontend hosting and continuous deployment.
This document provides tips for fundraising from startup founders Roland Yau and Sze Lok Chan. It discusses generating competition to create urgency for investors, fundraising in parallel rather than sequentially, having a clear fundraising narrative focused on what you do and why it's compelling, and prioritizing relationships with people over firms. It also notes how the pandemic has changed fundraising, with examples of deals done virtually during this time. The tips emphasize being fully prepared before fundraising and cultivating connections with investors in advance.
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
This document discusses Amazon's machine learning services for building conversational interfaces and extracting insights from unstructured text and audio. It describes Amazon Lex for creating chatbots, Amazon Comprehend for natural language processing tasks like entity extraction and sentiment analysis, and how they can be used together for applications like intelligent call centers and content analysis. Pre-trained APIs simplify adding machine learning to apps without requiring ML expertise.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.
3. What to expect from the session
• A deeper understanding of the AWS
policy language.
• Knowledge of how to better control
access to AWS resources.
• Using policy summaries to avoid common
mistakes
• Typos
• Permission errors
• Example policy library
4. Your first day as an IAM administrator
• Scenario: A user at your company needs list and read
access to only one S3 bucket.
You create this policy
{
"Version": "2012-10-17",
"Statement": [ {
"Effect": "Allow",
“Action": [“s3:Get*", “s3:List*”],
"Resource": “arn:aws:s3:::HumanResources"
}
]
}
5. Access Levels
Categorize actions across ever service
Access Level Description Example
List Actions that allow you to see a
list of resources
s3:ListBucket,
s3:ListAllMyBuckets
Read Actions that allow you to read
the content in resources
s3:GetObject,
s3:GetBucketTagging
Write Actions that allow you to
create, delete, or modify
resources
s3:PutObject,
s3:DeleteBucket
Permissions management Actions that allow you to grant
or modify permissions to
resources
s3:PutBucketPolicy
6.
7. The policy language
• Provides authorization
• Two parts:
– Specification: Defining access policies
– Enforcement: Evaluating policies
10. Effect
• By default any user or role is denied access to actions
and resources in the account.
• That means everything is implicitly denied by default.
• Every policy requires Effect
• Deny
• Allow
11. Principal – Examples
• An entity that is allowed or denied access to a resource
• Indicated by an Amazon Resource Name (ARN)
• With IAM policies, the principal element is implicit (i.e., the user, group, or role attached)
<!-- Everyone (anonymous users) -->
"Principal":"AWS":"*.*"
<!-- Specific account or accounts -->
"Principal":{"AWS":"arn:aws:iam::123456789012:root" }
"Principal":{"AWS":"123456789012"}
<!-- Individual IAM user -->
"Principal":"AWS":"arn:aws:iam::123456789012:user/username"
<!-- Federated user (using web identity federation) -->
"Principal":{"Federated":"accounts.google.com"}
<!-- Specific role -->
"Principal":{"AWS":"arn:aws:iam::123456789012:role/rolename"}
<!-- Specific service -->
"Principal":{"Service":"ec2.amazonaws.com"}
Replace
with your
account
number
Principal
Action
Resource
Condition
12. Action – Examples
• Describes the type of access that should be allowed or denied
• You can find actions in the docs or use the policy editor to get a drop-down list
• Statements must include either an Action or NotAction element
<!-- EC2 action -->
"Action":"ec2:StartInstances"
<!-- IAM action -->
"Action":"iam:ChangePassword"
<!– Amazon S3 action -->
"Action":"s3:GetObject"
<!-- Specify multiple values for the Action element-->
"Action":["sqs:SendMessage","sqs:ReceiveMessage"]
<-- Wildcards (* or ?) in the action name. Below covers create/delete/list/update-->
"Action":"iam:*AccessKey*“
"Action":“s3:Get*“
Principal
Action
Resource
Condition
13. Understanding NotAction
• Lets you specify an exception to a list of actions
• Could result in shorter policies than using Action and exclude many actions
• Example: Let’s say you want to allow everything but IAM APIs
{
"Version": "2012-10-17",
"Statement": [ {
"Effect": "Allow",
"NotAction": ["iam:*",
"organizations:*“],
"Resource": "*"
}
]
}
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": "*",
"Resource": "*"
},
{
"Effect": "Deny",
"Action": ["iam:*",
"organizations:*“],
"Resource": "*"
}
]
}
or
14. Understanding NotAction
• Lets you specify an exception to a list of actions
• Could result in shorter policies than using Action and exclude many actions
• Example: Let’s say you want to allow everything but IAM APIs
{
"Version": "2012-10-17",
"Statement": [ {
"Effect": "Allow",
"NotAction": ["iam:*",
“organizations:*",
"Resource": "*"
}
]
}
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": "*",
"Resource": "*"
},
{
"Effect": "Deny",
"Action": ["iam:*",
“organizations:*“],
"Resource": "*"
}
]
}
or
This is not a Deny. A user could still have a
separate policy that grants IAM:*
If you want to prevent the user from ever being
able to call IAM APIs, use an explicit Deny.
Is there a
difference?
15. Resource – Examples
• The object or objects being requested
• Statements must include either a Resource or a NotResource element
<-- S3 bucket and object-->
"Resource":"arn:aws:s3:::my_corporate_bucket"
"Resource":"arn:aws:s3:::my_corporate_bucket/*"
<-- All S3 buckets, except this one -->
"NotResource":"arn:aws:s3:::security_logging_bucket"
<-- Amazon SQS queue-->
"Resource":"arn:aws:sqs:us-west-2:123456789012:queue1"
<-- Multiple Amazon DynamoDB tables -->
"Resource":["arn:aws:dynamodb:us-west-2:123456789012:table/books_table",
"arn:aws:dynamodb:us-west-2:123456789012:table/magazines_table"]
<-- All EC2 instances for an account in a region -->
"Resource": "arn:aws:ec2:us-east-1:123456789012:instance/*"
Principal
Action
Resource
Condition
Replace
with your
account
number
16. Condition
Principal
Action
Resource
Condition
• This is the only element of a policy that is optional
• Conditions is an IAM best practice and adds extra
security
• Context keys
• Global
• Service specific
• Operators
• Values
17. Condition example
“Condition” : {
"DateGreaterThan" : {"aws:CurrentTime" : "2017-01-01T11:00:00Z"},
"DateLessThan": {"aws:CurrentTime" : "2017-12-31T15:00:00Z"},
"IpAddress" : {"aws:SourceIp" : ["192.0.2.0/24", "203.0.113.0/24"]}
}
• Allows a user to access a resource under the following conditions:
• The time is after 11:00 A.M. on 01/01/2017 AND
• The time is before 3:00 P.M. on 12/31/2017 AND
• The request comes from an IP address in the 192.0.2.0 /24 OR 203.0.113.0 /24
range
• All of these conditions must be met in order for the statement to evaluate to TRUE.
AND
OR
What if you wanted to restrict access to a time frame and IP address range?
Principal
Action
Resource
Condition
18. Take advantage of IfExists conditional operator
• Many condition keys only exist for certain resource
types.
• If you test for a nonexistent key, your policy will fail to
evaluate (in other words, access denied).
• You can add IfExists at the end of any condition
operator except the Null condition (for example,
StringLikeIfExists).
• Allows you to create policies that “don’t care” if the key is
not present.
Serious Ninja-foo
19. Policy enforcement
Final decision =“Deny”
(explicit Deny)
Yes
Final decision =“Allow”
Yes
No Is there an
Allow?
4
Decision
starts at Deny
1
Evaluate all
applicable
policies
2
Is there an
explicit
Deny?
3
No Final decision =“Deny”
(default Deny)
5
• AWS retrieves all policies
associated with the user and
resource.
• Only policies that match the action
and conditions are evaluated.
• If a policy statement
has a Deny, it trumps
all other policy
statements.
• Access is granted
if there is an
explicit Allow and
no Deny.
• By default, an
implicit (default)
Deny is returned.
20. Policy variables
• Predefined variables based on service request context
• Global keys (aws:SourceIP,
aws:MultiFactorAuthPresent, etc.)
• Principal-specific keys (aws:username, aws:userid,
aws:PrincipalType)
• Provider-specific keys (graph.facebook.com:id,
www.amazon.com:user_id)
• SAML keys (saml:cn, saml:edupersonassurance)
• See documentation for service-specific variables
• Benefits
• Simplify policy management
• Reduce the need for hard-coded, user-specific policies
21. {
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["s3:ListBucket"],
"Resource": ["arn:aws:s3:::myBucket"],
"Condition":
{"StringLike":
{"s3:prefix":["home/${aws:username}/*"]}
}
},
{
"Effect":"Allow",
"Action":["s3:*"],
"Resource": ["arn:aws:s3:::myBucket/home/${aws:username}",
"arn:aws:s3:::myBucket/home/${aws:username}/*"]
}
]
}
The anatomy of a policy with variables
Grants a user access to a home directory in S3 that can be accessed programmatically
Version is required
Variable in conditions
Variable in resource ARNs
26. Conditions
• Optional criteria that must evaluate to true for
the policy to evaluate as true
(ex: restrict to an IP address range)
• Can contain multiple conditions
• Condition keys can contain multiple values
• If a single condition includes multiple values
for one key, the condition is evaluated using
logical OR
• Multiple conditions (or multiple keys in a
single condition): the conditions are
evaluated using logical AND
Condition element
Condition 1:
Key1: Value1A
Condition 2:
Key3: Value3A
AND
AND
Key2: Value2A OR Value2B
OR ORKey1: Value1A Value1B Value 1C
28. AWS Organizations
Control AWS service
use across accounts
Policy-based management for multiple AWS accounts.
Consolidate billingAutomate AWS
account creation
29. How is Organizations different from IAM?
• Create groups of AWS accounts with AWS Organizations.
• Use Organizations to attach Service Control Policies to
those groups to centrally control AWS service use.
• Principals in the AWS accounts can only use the AWS
services allowed by both the SCP and the AWS IAM
policies attached to them.
30. Service Control Policies (SCPs)
• Enables you to control which AWS service APIs are
accessible
- Define the list of APIs that are allowed – whitelisting
- Define the list of APIs that must be blocked – blacklisting
• Cannot be overridden by local administrator
• Resultant permission on IAM user/role is the intersection
between the SCP and assigned IAM permissions
• Necessary but not sufficient
• IAM policy simulator is SCP aware