1. Home
  2. Training Library
  3. Amazon Web Services
  4. Courses
  5. How AWS IAM is Used to Securely Manage Access

Summary

Contents

keyboard_tab
Securely Manage Access with IAM
1
Introduction
PREVIEW2m 5s
3
4
Summary
1m 24s
Start course
Overview
Difficulty
Intermediate
Duration
17m
Students
41
Ratings
5/5
starstarstarstarstar
Description

This course provides an overview of the AWS Identity & Access Management Service, commonly referred to as IAM, along with its core features. This is a key security service within AWS and is likely to be one of the first security services you will use and come across allowing you to manage specific access controls within your environment for your users.

Learning Objectives

  • Understand what is meant identity and access management and the difference between authentication, authorization, and access control
  • Learn the components of IAM as well as its reporting features

Intended Audience

  • AWS Administrators
  • Security Engineers
  • Security Architects
  • Anyone who is looking to increase their knowledge of the IAM service in preparation for an AWS certification

Prerequisites

To get the most out of this course, you should have some basic hands-on experience of AWS and some of its core services, but it is not essential.

Transcript

This course covered some of the fundamental concepts of AWS IAM, it was designed to give you an insight into the service providing an explanation of what it is and what it’s used for, in addition to the core features that IAM provides to help you secure your AWS environment and it’s resources.  

I started by explaining what is actually meant by identity and access management and the difference between authentication, authorization, and access controls.  I then focused on the components of IAM which allow you to manage and implement security controls and these included:

  • Users
  • User Groups
  • Roles
  • Policies
  • Identity Providers
  • Password Policies
  • Security Token Service Endpoints

I then gave a quick review of some of the reporting features that IAM offers, which covered:

  • Access Analyzer
  • Credential Report
  • Organization Activity
  • Service Control Policies

That now brings me to the end of this lecture and to the end of this course, and so you should now have a greater understanding of how IAM is used to securely manage access to your resources.

Feedback on our courses here at Cloud Academy is valuable to both us as trainers and any students looking to take the same course in the future. If you have any feedback, positive or negative, it would be greatly appreciated if you could contact support@cloudacademy.com

Thank you for your time and good luck with your continued learning of cloud computing. Thank you.

About the Author
Avatar
Stuart Scott
AWS Content Director
Students
187129
Labs
1
Courses
158
Learning Paths
115

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.