Listly by animeshb-social
IAM provides the interface to join the great world of AWS. Its major goal is to provide both human and computer, who are the consumers of AWS services a way to access them.
IAM service have five(5) components:-
User
Groups
Policy
Roles
API Keys
We have learned about IAM policy and its basics. We will apply those to a specific user here. We will also learn the various way s IAM users can get access to the AWS resources and also how can an IAM user rotate password.
When we want to give access to various resources to AWS, how do we do it, how do we define the various ways a user can get access. These are parameters are defined in a JSON document called IAM Policy. We will learn about this in this blog.
AWS is very vast in its present form, understanding it would be very challenging. We will being this journey at the epicenter of AWS, the Shared responsibility model and its global infrastructure.
Azure, AWS, and GCP are the front runner in providing Cloud technologies. As per 2020 Gartner Magic Quadrant for Cloud Infrastructure and Platform Services, AWS is the leader from last 10 years. How much is the difference between these service providers. How big is the reach of these? Do they differ between each other drastically or the difference is minuscule?
When to create a IAM role and when to use a IAM User is always a confusing topic to master. You will learn through this piece the answer to this dilemma. You will learn when to create a IAM Roles, how to use the IAM Role, Uses of IAM roles. After learning this you will never be scratching your head for using IAM Roles.
AWS STS or Security Token Service, provides temporary access credentials to access any AWS resource. This temporary access can be requested by other AWS account, or a federated user in case of hybrid cloud environment who can be authenticated using SAML 2.0, Web identity provider. AWS STS works very closely with IAM Roles.
Cloud technology is a tool for the developers, creating sophisticated softwares. How does developer access the cloud? Does AWS Console is the only way to access the cloud? Developers love code, CLIs and SDKs, AWS provides access to its cloud resources using AWS IAM API Keys.
When you are storing your data on a physical server which is not owned by you. The concern of data security is paramount. AWS KMS or key management service helps in this regards to safeguard data by encrypting it. You can use keys provided by you or by AWS to encrypt the data. AWS KMS makes sure that the data and the keys are not stored together, restricting the extent of data theft.
As part of the Shared responsibility of cloud between user and AWS, as an user we have to manage the application security and VPC security. This may be difficult to do for a lot of independent developers. AWS has a managed service called AWS inspector. Lets study about it.
We have learned about IAM policy and its basics. We will apply those to a specific user here. We will also learn the various way s IAM users can get access to the AWS resources and also how can an IAM user rotate password.
AWS provides many ways to control its resources. One of the fastest and the most effective way is the AWS CLIs and SDKs. The best benefit of using CLI or SDKs it that you can automate complex workflow. In this article we will learn to download, install, configure AWS CLI and SDKs. It will also guide in using Postman Client to use HTTP APIs.