1. Home
  2. Training Library
  3. Amazon Web Services
  4. Courses
  5. Understanding of AWS Authentication, Authorization & Accounting

Summary

The course is part of these learning paths

Solutions Architect – Professional Certification Preparation for AWS
course-steps 47 certification 6 lab-steps 19 quiz-steps 4 description 2
SysOps Administrator – Associate Certification Preparation for AWS
course-steps 35 certification 5 lab-steps 30 quiz-steps 4 description 5
Security - Specialty Certification Preparation for AWS
course-steps 22 certification 2 lab-steps 12 quiz-steps 5
AWS Advanced Networking – Specialty Certification Preparation
course-steps 18 certification 2 lab-steps 8 quiz-steps 4
AWS Access & Key Management Security
course-steps 6 certification 2 lab-steps 2 quiz-steps 2
more_horiz See 3 more

Contents

keyboard_tab
Introduction
1
Introduction
PREVIEW3m 14s
Authentication, Authorization & Accounting
Summary
6
Summary
3m 20s
play-arrow
Start course
Overview
DifficultyIntermediate
Duration1h 26m
Students8
Ratings
4.9/5
star star star star star-half

Description

Cloud Security is a huge topic, mainly because it has so many different areas of focus. This course focuses on three areas that are fundamental, AWS Authentication, Authorisation and Accounting.

These three topics can all be linked together and having an understanding of the different security controls from an authentication and authorization perspective can help you design the correct level of security for your infrastructure. Once an identity has been authenticated and is authorised to perform specific functions it's then important that this access can be tracked with regards to usage and resource consumption so that it can be audited, accounted and billed for.

The course will define and discuss each area, and iron out any confusions of meaning between various security terms. Some people are unaware of the differences between authentication, authorization and access control, this course will clearly explain the differences here allowing you to use the correct terms to describe your security solutions.

From an AWS authentication perspective, a number of different mechanisms are explained, such as Multi-Factor AWS Authentication (MFA), Federated Identity, Access Keys and Key Pairs. With the help of demonstrations, you can learn how to apply access keys to your AWS CLI for programmatic access and understand the differences between Linux and Windows authentication methods using AWS Key Pairs.

When we dive into understanding authorization we cover IAM Users, Groups, Roles and Policies, providing examples and demonstrations. Within this section, S3 authorization is also discussed, looking at access control lists (ACLs) and Bucket Policies. Moving on from S3, we look at network and instance level authorization with the help of Network Access Control Lists (NACLs) and Security Groups.

Finally, the Accounting section will guide you through the areas of Billing & Cost Management that you can use to help identify potential security threats. In addition to this, we explain how AWS CloudTrail can be used to track API calls to analyse what users are doing and when. This makes CloudTrail a strong tool in tracking, identifying and monitoring a user's actions within your AWS environment.

Transcript

Hello and welcome to this short lecture to complete and summarize this course.

Authentication, authorization, and accounting is key within any infrastructure. From different AWS environments such as test dev and production, to different departments using your AWS infrastructure, such as sales and marketing, etc.

If you overlook security from an identity and authorization perspective, you could leave yourself open to security loopholes which in turn can lead to abuse from not only internal users, but external as well. Security remains the highest sticking point within cloud computing. It's the one key topic that consistently gains attention and requires constant and considerable effort to get right and implement efficiently.

In order to do this correctly, a clear understanding and definition of security terms are essential. Such as the clear differences between authentication, authorization, and access control we spoke about in one of the early lectures of this course. If you want to be an effective security expert, you need to know the differences between these terms to allow you to select and architect the right solution to meet your needs.

There are so many different methods of authentication and granting permissions. It can get a little overwhelming when selecting the most effective mechanism. However when doing so, implement the solution that meets the security level of the data and resources that you are protecting. If the data or resource is highly sensitive then you would to implement multiple levels of authentication, such as MFA in addition to multiple levels of authorization at different levels. The more restrictions that are in place the harder it is to breach.

With potentially hundreds or thousands of users accessing your AWS environment to create, modify, or delete resources, tracking this access can be crucial in resolving operational issues in security breaches and threats. This is where AWS CloudTrail, by tracking every API call, plays a great role in helping to account for actions made by an identity.

This information can be used to track costs incurred by particular users, should they have launched a number of instances with a single API call.

Billing also plays a part in helping to secure your infrastructure, Analysis of your billing information allows you to track and notice trends occurring in your infrastructure. Any anomaly outside of these predicted trends could be a security breach that needs investigation.

Implementing numerous authentication methods at the correct levels along with multiple authorization mechanisms where identities can be tracked and monitored throughout their authenticated session, in addition to graphical billing analysis, allows you to create an effective, secure, and proactive security analysis solution.

I would recommend you take a look at our labs we have here at CloudAcademy, as there are a number of AWS labs covering security, such as advanced IAM and S3 policies and the creation of VPC subnets using NACLs. So feel free to take a look at these in your own time to become more familiar on how to set these up within a real environment.

If you have any feedback on this course, positive or negative, please do leave a comment on the landing page of this course. Your feedback is greatly appreciated.

That brings us to the end of this lecture and the end of the course. I hope you have found it useful and has answered some questions you may have had. Thank you for your time and good luck with your continued learning of cloud computing. Thank you.

About the Author

Students58492
Labs1
Courses55
Learning paths39

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data centre and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 50+ courses relating to Cloud, most within the AWS category with a heavy focus on security and compliance

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.