AWS Region
cluster of data centers
π‘ TIP: Most AWS services are region-scoped
How to choose an AWS Region?
AWS Availability Zone (AZ)
one or more discrete data centers with redundant power, networking, & connectivity
usually 3, min is 3, max is 6
What are some benefits of Availability Zones (AZs)?
AWS Points of Presence (Edge Locations)
content is delivered to end users with lower latency
Amazon has 400+ Points of Presence in 90+ cities across 40+ countries
IAM
Identity & Access Management;
Global service
Root account
created by default;
should NOT be used or shared
IAM User
IAM Identity to represent people within your organization;
can be grouped
IAM User Group
group of IAM users;
only contain users, NOT other groups
users don’t have to belong to group & user can belong to multiple groups
IAM Policy
JSON documents that define a set of permissions for making requests to AWS services and can be used by IAM Users, User Groups, & IAM Roles
π‘ TIP: Apply the least privilege principle
IAM Policy Structure
IAM Policy Statement Structure
AWS Managed Policy
standalone policy that is created and adminstered by AWS
(i.e. IAMReadOnlyAccess)
Inline Policy
policy created for a single IAM identity (a user, group, or role)
π‘ TIP: If a policy could apply to more than one entity, it’s better to use. a managed policy
Multi Factor Authentication (MFA)
password you know + security device you own
β¨ Best Practice: Root Accounts & IAM users (at a minimum) should be protected with MFA
What is the main benefit of MFA?
if a password is stolen or hacked, the account is not compromised
How can users access AWS?
3 ways
β¨ Best Practice: Access Keys are secret, just like a password. Don’t share them
Access Key ID ~= username, Secret Access Key ~= password
AWS Command Line Interface (CLI)
tool that enables you to interact with AWS services using commands in your command-line shell (i.e. terminal)
alternative to using AWS Management Console
AWS Software Development Kit (SDK)
language specific APIs (set of librariers) that enable you to access & manage AWS services programatically;
embedded within your application
IAM Role
IAM Identity that defines a set of permissions for making requests to AWS services, and will be used by an AWS service
(i.e. EC2 Instance Roles, Lambda Function Roles)
What IAM Security Tools does AWS provide?
IAM Credentials Report
IAM Access Advisor
π‘TIP: Helpful information to audit and revise policies (i.e. least priviledge principle)
What are some IAM User & Group best practices?