What are IAM Users?
Users are people within your organization, and can be grouped.
Describe the below image from an IAM standpoint:
Users don’t have to belong to a group, and user can belong to multiple groups.
Describe IAM Permissions, like, which type of document is assigned and which principle to follow.
Graphically describe IAM Policies Inheritance by way of different groups or users who are not in any group.
Describe this code from an IAM perspective.
General
- Version: policy language version, always include “2012-10-17”
- Id: an identifier for the policy (optional)
- Statement: one or more individual statements (required)
Statement
- Sid: an identifier for the statement (optional)
- Effect: whether the statement allows or denies access (Allow, Deny)
- Principal: account/user/role to which this policy applied to
- Action: list of actions this policy allows or denies
- Resource: list of resources to which the actions applied to
- Condition: conditions for when this policy is in effect (optional, not shown)
List all the ways in which you can set an IAM Password Policy.
Strong passwords = higher security for your account
In AWS, you can setup a password policy:
- Set a minimum password length
- Require specific character types:
- including uppercase letters
- lowercase letters
- numbers
- non-alphanumeric characters
- Allow all IAM users to change their own passwords
- Require users to change their password after some time (password expiration)
- Prevent password re-use
Why use MFA (Multi Factor Authentication)?
IAM
List the virtual MFA devices:
IAM
Both of these options support multiple tokens on a single device. You’ve used MFA on other devices before, this is no different. You get a one-time passcode to enter as a secondary authentication.
List the physical MFA devices:
IAM
All of these options have support for multiple root and IAM users using a single security key.
How can users access AWS? List the three options.
IAM
What are access keys? Provide an example of the two types of access keys.
IAM
Example Keys
- Access key ID: AKIASK4E37PV4983d6C
- Secret Access Key: AZPN3zojWozWCndIjhB0Unh8239a1bzbzO5fqqkZq
What is AWS CLI?
IAM
What is AWS SDK?
IAM
What are IAM Roles for Services?
Common roles:
- EC2 Instance Roles
- Lambda Function Roles
- Roles for CloudFormation
List the two IAM security tools for auditing permissions:
IAM Credentials Report (account-level)
- A report that lists all your account’s users and the status of their various credentials
IAM Access Advisor (user-level)
- Access advisor shows the service permissions granted to a user and when those services were last accessed.
- You can use this information to revise your policies.
Describe the IAM Guidelines and Best Practices:
Review the IAM section summary, if you find something unfamiliar, rate this card as poor knowledge so you can review.