From the course: AWS Well-Architected Framework: Security Pillar

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Identity and Access Management

Identity and Access Management - Amazon Web Services (AWS) Tutorial

From the course: AWS Well-Architected Framework: Security Pillar

Start my 1-month free trial

Identity and Access Management

- [Instructor] All network environments have some processes in place, to ensure that, I know who my users are, I can identify them, I set levels of authorization. At Amazon, we have a service called Identity and Access Management. And every service supports identity and access management to some degree. And in fact, this is allowing us to control access to the resources in our AWS accounts. First of all, I have to be an authenticated user. Once I get through that hurdle, then I'll have a level of authorization attached to my user account, and this is what I can do, and maybe what I can't do. IAM works with security policies, sometimes called permission policies. It's a list of permissions, that you could access, for example, this EC2 instance, and these particular virtual hard disks, or maybe it's more broad saying, you're under administrator of everything. So the policies are assigned to IAM users, and they…

Contents