Milenyals Forum

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Leak AWS: Overview of AWS Identity & Access Management (IAM)

rocket 

Ultimate Poster
Contributor
Half Member
Registered
Joined
Feb 25, 2019
Messages
46,439
Reputation
9
Popularity
1,290
Points
223
You must be registered for see images

Video: .MP4, AVC, 1920x1080, 30 fps | Audio: English, AAC, 44.1 KHz, 2 Ch | Duration: 1h 12m | 1.05 GB
Instructor: Stuart Scott

This course looks at one of the key Security services within AWS, Identity & Access Management, commonly referred to IAM.​

This service manages identities and their permissions that are able to access your AWS resources and so understanding how this service works and what you can do with it will help you to maintain a secure AWS environment. IAM is an important step in ensuring your resources are secure.
What is Identity & Access Management? This lecture will explain what IAM means and why it's necessary to implement and maintain control of this service.
Groups, Users & Roles: This lecture will define the differences between Groups, Users and Roles and how each of these objects are typically used
IAM Policies: This lecture we will discuss what IAM Policies are, how to create, modify and apply them within your AWS environment
Multi-Factor Authentication: This lecture will explain what MFA is and the best practices
Identity Federation: This lecture will explain how external identities (users who do not have IAM user accounts) can access your AWS resources through the use of identity providers
IAM Features: This lecture will focus on the information contained within IAM Account settings, the credential report and also how IAM integrates with KMS
Setup and configure users, groups and roles to control which identities have authorization to access specific AWS resources
Implement Multi-Factor Authentication
Create and implement IAM Policies allowing you to grant or restrict very granular and specific permissions across a range of resources
Implement a Password policy to align with your internal security controls
Understand when and why you may use Identity federation access
Understand how the Key Management Service (KMS) is used in conjunction with IAM

DOWNLOAD[hide thanked=1]
nitroflare
[/hide]
 
Top