In this video, you will understand that the root AWS account is needed to perform certain actions, like closing your AWS account. You will learn how to change your account settings in order to allow Identity and Access Management (IAM) users the ability to gain access to the financial reporting tools available within AWS.
- [Voiceover] So far, I have spent a lot of time talking…about tools you can use to control…what engineers are able to do within your AWS account.…That's all well and good,…but what about our friends over in the finance department?…The financial view of your AWS account is an important one.…Just like you don't want to give every engineer…in your organization the same access to AWS resources,…you probably don't want to give…every finance person the same level of access.…Let's explore how to configure IAM users…to manage the financial aspects of your AWS account.…
Contained within the Billing and Cost Management dashboard,…AWS offers a rich set of tools…to help you understand the financial health of your account.…Some of the most important features…of the billing and cost management dashboard include…the Cost Explorer, an interactive dashboard…that allows you to view a detailed account of your spend…by each AWS service offering.…Also included is the Budgets Dashboard,…where you can create target budgets…for your AWS service costs on a monthly basis.…
Sharif Nijim couples pragmatic advice with practical examples that educate organizations on how to create a secure infrastructure within Amazon Web Services. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key identity and access management concepts: users, groups, roles, and policies. At the end of the course, he helps you prepare for the inevitable audit of your AWS account(s).
- The AWS shared responsibility model and security landscape
- Enabling CloudTrail
- Configuring AWS Identity and Access Management (IAM)
- Troubleshooting IAM policies
- Granting temporary access
- Incorporating least privilege
- Controlling access to Simple Storage Service (S3)
- Preparing for security audits
- Getting audit help from Trusted Advisor