CloudAcademy

Advanced roles and groups management using IAM

The hands-on lab is part of these learning paths

Security - Specialty Certification Preparation for AWS

course-steps 21 certification 1 lab-steps 11

Solutions Architect – Associate Certification Preparation for AWS - Feb 2018

course-steps 28 certification 6 lab-steps 23

AWS Security Services

course-steps 7 certification 1 lab-steps 3 quiz-steps 5

AWS Access & Key Management Security

course-steps 5 certification 1 lab-steps 2 quiz-steps 3

Certified Developer—Associate Certification for AWS

course-steps 14 lab-steps 15 quiz-steps 18

Solutions Architect – Associate Certification Preparation for AWS

course-steps 8 certification 1 lab-steps 18 quiz-steps 5

Solutions Architect – Professional Certification Preparation for AWS

course-steps 15 certification 1 lab-steps 9 quiz-steps 1

SysOps Administrator – Associate Certification Preparation for AWS

course-steps 6 certification 1 lab-steps 18 quiz-steps 7

DevOps Engineer – Professional Certification Preparation for AWS

course-steps 16 certification 1 lab-steps 10 quiz-steps 2

SysOps Administrator—Associate Certification for AWS

course-steps 14 lab-steps 18 quiz-steps 13

Lab Steps

keyboard_tab
lock
Logging in to the Amazon Web Services Console
lock
Create IAM Group
lock
Create IAM User
lock
Create customer managed policy with policy generator
lock
Attach policy to Users
lock
Create an IAM Role
lock
Launch EC2 Instances with IAM Profile
lock
Connect to a remote shell using an SSH connection
lock
Test IAM Profile from EC2 Linux instance

Ready for the real environment experience?

DifficultyIntermediate
Duration1h
Students3591

Description

Advanced roles and groups management using IAM

AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources for your users. You can specify permissions to a single user or you can use groups to specify permissions for a collection of users, which can make those permissions easier to manage for those users. Furthermore, you can use a Role to grant authorization to AWS resources without any credentials (password or access keys) directly associated with it. In this Lab, we allocate time to learn the recommended AWS security best practices.

 

Do you have questions about this Lab? Contact our cloud experts by sending an email to support@cloudacademy.com.

About the Author

Students3591
Labs1

Paolo Latella is an AWS Community Hero, Cloud Solutions Architect and AWS Technical Trainer at XPeppers, an enterprise focused on Cloud technologies and DevOps methodologies. Paolo has more than 15 years of experience in IT and has worked on AWS technologies since 2008. Before joining XPeppers he was a Solution Architect Team Leader at Interact, an enterprise leader in Digital Media for the Cloud. There he followed the first Hybrid Cloud project for the Italian Public Sector. Paolo hosts regular meetings as the Co-Founder of AWS User Group Italia and AWS User Group Ticino. He can also be found participating at various technology conferences in Italy.