As your organization grows, more and more people are going to need access to your cloud resources. The ability to create and assign granular permissions is crucial to ensure the safety of your data and to avoid unauthorized access to reserved information.
Identity and Access Management (IAM) is the AWS tool that gives you centralized control over your AWS resources. It allows you to create fine-grained policies using JSON syntax to grant unique privileges to each and every available resource. This course will tell you everything you need to know to get started hardening your infrastructure.
Who should take this course
As a beginner to intermediate course, you'll require no previous experience, nevertheless some knowledge of AWS and its main services (like EC2 and S3) would really help you better understanding the concepts you'll encounter. You may therefore want to check out our Introduction to AWS and some of our other AWS courses before tackling this tutorial.
As a follow up, check out our IAM questions. You will learn more about the topic both while answering and following through the associated documentation.
Do you have questions on this course? Contact our cloud experts in our community forum.
Hi, and welcome to CloudAcademy.com's Video Series on IAM the AWS Identity and Access Management System.
In this course, we'll explore the key elements of the IAM system and learn how to use it to effectively control access to your AWS resources. We'll learn about controlling users, groups, roles, access policies, multi-factor authentication, also known as MFA, and about tracking authentication events through logs.
By way of an introduction IM features centralized control of users, security credentials and user access including problematic API access, safe and easy sharing of AWS resources and control over their creation and life cycles, organized resource access by job profile according to the need to know. Easily upgraded which means removed or added permissions, and control over resources and data, and integrated resources within secure and logical networking architectures.
So let's through the next videos dive in to AWS' IAM.
About the Author
David taught high school for twenty years, worked as a Linux system administrator for five years, and has been writing since he could hold a crayon between his fingers. His childhood bedroom wall has since been repainted.
Having worked directly with all kinds of technology, David derives great pleasure from completing projects that draw on as many tools from his toolkit as possible.
Besides being a Linux system administrator with a strong focus on virtualization and security tools, David writes technical documentation and user guides, and creates technology training videos.
His favorite technology tool is the one that should be just about ready for release tomorrow. Or Thursday.