Unit 2 - 8/18
IAM Lab 1
Recognize best practices for identity and access management (IAM)
Use on IAM system to set up a text alert event
Create our own IAM User and assign permissions
Add permissions to our own created Admin Group
Securing Your AWS Resources - 9/3
Exercise 5.1
Create a Password Policy for Your IAM Users
To do this, we went into account settings, clicked edit, and then selected the Custom option.
We customized the Password Policy by changing the value of Minimum Password Length from 8 characters to 10, we were also given the option to require at least one uppercase letter, one lowercase letter, one number, or one non-alphanumeric character.
Then we hit save changes to update the policies.
Exercise 5.2
Create an IAM User and Assign Limited Permissions
To complete this task, we added a new user from the IAM Dashboard by assigning a new name and selecting the Programmatic Access option.
Then we created an access key ID and a secret access key
After changing the policies to make the user's security stronger, we saved the new user.
Exercise 5.3
Assign Multiple Users to an IAM Group
To do this, we assigned our newly created user, Steve to an IAM Group.
Then we attached policues to the group, giving them to our user in the process.
Now our new user has access to the policies because we assigned them to the group.
Cloud Shell
EC2 Roles
Credential Report
In this task, you'll step into the role of a junior cloud administrator for a small student-led web development company called "ByteBuilders Inc." Your team is building a new website, and you've been asked to set up a new user account for a team member.
The goal is to create a user and give them the permissions they need to do their job—nothing more. This is a core concept in cloud security known as the. Learning Objectives
By the end of this task, you will know how to:
Create an IAM group and a new IAM user.
Write and apply a custom IAM policy.
Attach a policy to a group to manage permissions efficiently.
Test and verify that a user has the correct (and limited) permissions.
Part 1: Your AWS Account
Part 2: Create an IAM Group
Part 3: Create an IAM User
Part 4: Create a Custom IAM Policy
Part 5: Attach the Policy to the Group
Part 6: Add the User to the Group
Unit 3 - Elastic Compute Cloud
Hands-on Lab
Learning Objectives
Utilize best practices in monitoring and securing content stored in the cloud
Detect and resolve common security alerts using thenmost efficient methods for given situations
Domain 3 Review: AWS Certified Cloud Practitioner
AWS Identity and Access Management (IAM) is a web service that enables Amazon Web Services (AWS) customers to manage users and user permissions in AWS. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users can access.
In this lab we practiced:
Exploring pre-created IAM Users and Groups
Inspecting IAM policies as applied to the pre-created groups
Following a real-world scenario, adding users to groups with specific capabilities enabled
Locating and using the IAM sign-in URL
Experimenting with the effects of policies on service access
Notes:
AWS Identity and Access Management (IAM) can be used to:
Manage IAM Users and their access: You can create Users and assign them individual security credentials (access keys, passwords, and multi-factor authentication devices). You can manage permissions to control which operations a User can perform.
Manage IAM Roles and their permissions: An IAM Role is similar to a User, in that it is an AWS identity with permission policies that determine what the identity can and cannot do in AWS. However, instead of being uniquely associated with one person, a Role is intended to be assumable by anyone who needs it.
Manage federated users and their permissions: You can enable identity federation to allow existing users in your enterprise to access the AWS Management Console, to call AWS APIs and to access resources, without the need to create an IAM User for each identity.