From the course: AWS Well-Architected Framework: Security Pillar
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Identity and Access Management - Amazon Web Services (AWS) Tutorial
From the course: AWS Well-Architected Framework: Security Pillar
Identity and Access Management
- [Instructor] All network environments have some processes in place, to ensure that, I know who my users are, I can identify them, I set levels of authorization. At Amazon, we have a service called Identity and Access Management. And every service supports identity and access management to some degree. And in fact, this is allowing us to control access to the resources in our AWS accounts. First of all, I have to be an authenticated user. Once I get through that hurdle, then I'll have a level of authorization attached to my user account, and this is what I can do, and maybe what I can't do. IAM works with security policies, sometimes called permission policies. It's a list of permissions, that you could access, for example, this EC2 instance, and these particular virtual hard disks, or maybe it's more broad saying, you're under administrator of everything. So the policies are assigned to IAM users, and they…