1. Home
  2. Training Library
  3. Identity Management, Security, and Encryption (SAP-C02)

What is Identity and Access Management?

Contents

keyboard_tab
Course Introduction
1
Introduction
PREVIEW2m 40s
How IAM is used to securely manage access
3
IAM Features
PREVIEW10m 39s
Managing user identities with long term credentials in IAM
5
Creating IAM Users
PREVIEW5m 3s
Using IAM policies to define and manage permissions
12
Cross-account access
Key Management Service (KMS)
17
What is KMS?
PREVIEW8m 25s
18
Components of KMS
PREVIEW11m 6s
AWS Web Application Firewall
22
AWS Firewall Manager
26
Policies
12m 16s
AWS Shield
AWS Secrets Manager

The course is part of this learning path

What is Identity and Access Management?
Overview
Difficulty
Intermediate
Duration
5h 31m
Students
16
Description

This section of the AWS Certified Solutions Architect - Professional learning path introduces the key identity management, security, and encryption services within AWS relevant to the AWS Certified Solutions Architect - Professional exam. Core to security is AWS Identity & Access Management commonly referred to as IAM. This service manages identities and their permissions that can access your AWS resources, so understanding how this service works and what you can do with it will help you to maintain a secure AWS environment. IAM is an important service in ensuring your resources are secure.

Want more? Try a Lab Playground or do a Lab Challenge

Learning Objectives

  • Learn about identity and access management on AWS, including users, groups & roles, IAM policies, MFA, identity federation, and cross-account access
  • Learn the fundamentals of AWS Web Application Firewall (WAF), including what it is, when to use it, how it works, and why use it
  • Understand how to configure and monitor AWS WAF
  • Learn about AWS Firewall Manager and its components
  • Learn how to configure AWS Shield
  • Learn the fundamentals of AWS Cognito
Transcript

Hello and welcome to this lecture where I shall provide an overview of what the Identity & Access Management service is, and what IAM actually means.

Firstly I want to define what is meant by Identity & Access Management and I shall break this down into two parts, starting with Identity Management. 

Identities, such as AWS usernames are required to authenticate you to your AWS account, and this authentication process is managed in 2 stages.

  1. The first part of this process is to define who you are, effectively presenting your identity, so for example your AWS username.  This identification is a unique value within IAM for your account, so this means IAM would prevent you from having 2 identical user accounts with the same name within the same AWS account.
  2. The second part of the authentication process is to verify that you are who you say you are. This is achieved by supplying additional data, and when using our AWS usernames we can verify this by supplying a password

Now, Access Management relates to authorization and access control.  Authorization determines what an identity can access within your AWS account once it’s been authenticated to it.  An example of this authorization would be the user’s list of permissions to access specific AWS resources, for example, they might have Full Access to EC2 or Read Only to RDS.

Access Control can be classed as the mechanism of accessing a secured resource.  For example, using the following:

  • Username and password (Authentication and Verification)
  • Multi-Factor Authentication (MFA, used as an additional verification step following a valid password)
  • Or Federated Access, which allows users external to AWS to access resources securely without having to supply AWS user credentials from a valid IAM user account.  Instead, these credentials are supplied from identity providers.  For more information on Identity Federation, please see our existing course here: https://cloudacademy.com/course/using-aws-identity-federation-simplify-access-scale-1549/

So essentially IAM can be defined by its ability to manage, control, and govern authentication, authorization, and access control mechanisms of identities to your resources within your AWS Account.

Having an understanding of the different security controls from an authentication and authorization perspective can help you design the correct level of security for your infrastructure.

About the Author
Students
26715
Courses
21
Learning Paths
11

Danny has over 20 years of IT experience as a software developer, cloud engineer, and technical trainer. After attending a conference on cloud computing in 2009, he knew he wanted to build his career around what was still a very new, emerging technology at the time — and share this transformational knowledge with others. He has spoken to IT professional audiences at local, regional, and national user groups and conferences. He has delivered in-person classroom and virtual training, interactive webinars, and authored video training courses covering many different technologies, including Amazon Web Services. He currently has six active AWS certifications, including certifications at the Professional and Specialty level.