With Security being one of the hottest topics within the Cloud industry today, Access and Key Management is often highlighted, questioned and misunderstood.
This learning path on AWS Access & Key Management Security has been designed to help you understand how AWS implements and manages access to its resources from an Identity, key management, and best practice perspective.
It will focus on the Identity & Access Management Service (IAM) and all of its features and how they operate together to provide secure access management to your resources. You will also gain a deeper understanding of how these features operate from an authentication, authorization and access control stance.
Security best practices will be covered across a range of abstract and container services, plus how the Key Management Service (KMS) and CloudHSM service can be used to manage and control the use of encryption keys and the benefits and considerations when doing so.
- AWS: Overview of Identity & Access Management (IAM)
- Understanding of AWS Authentication, Authorization and Accounting
- AWS Security Best Practices: Abstract and Container Services
- Amazon Web Services – Key Management Service (KMS)
- Amazon Web Services - CloudHSM
- April 6, 2018 - Added Learning Path Exam
- September 21st 2018 - Added Course 'Understanding S3 Encryption Mechanisms to secure your data'
Learning Path Steps
This course looks at one of the key Security services within AWS, Identity & Access Management, commonly referred to IAM. This service manages identities and their permissions that are able to access your AWS resources and so understanding how this service ...
Learn how to manage our organization using IAM Users and Groups and IAM Roles
Cloud Security is a huge topic, mainly because it has so many different areas of focus. This course focuses on three areas that are fundamental, AWS Authentication, Authorisation and Accounting. These three topics can all be linked together and having an u...
Authentication, Authorization & Accounting
When implementing different AWS services and architecting them within your environments, whether it be production, test or dev, do you know your security responsibilities for these services? It is very likely that you are using services from three differen...
Course Description Unencrypted data can be read and seen by anyone who has access to it, and data stored at-rest or sent between two locations, in-transit, is known as ‘plaintext’ or ‘cleartext’ data. The data is plain to see and can be seen and under...
Course Description We have all seen in the media numerous occurrences whereby large international organizations have had their data exposed and leaked that had been stored on S3. Any sensitive data stored in the cloud MUST be encrypted, and when stori...
In this lab, you'll learn about Amazon Key Management Service to encrypt S3 and EBS Data at an intermediate level. Get started today!
AWS Key Management Service (KMS) Intermediate
Course Description: AWS CloudHSM is the name of Amazon’s original encryption key solution. HSM stands for Hardware Security Module and in the solution provided by AWS is a Safenet Luna appliance hosted at AWS. The appliance is single tenant and exclusive t...
Exam: Access & Key Management Security on AWS
About the Author
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data centre and network infrastructure design, to cloud architecture and implementation.
To date Stuart has created over 40 courses relating to Cloud, most within the AWS category with a heavy focus on security and compliance
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.