-
Book Overview & Buying
-
Table Of Contents
AWS Security Cookbook - Second Edition
By :
Secure access management is crucial for effectively managing who can access our AWS resources and what actions they can perform. This knowledge ensures that our AWS environment remains secure and compliant by allowing us to precisely control permissions and minimize the risk of unauthorized access. It empowers us to implement a robust security posture that safeguards our data and resources, while also enabling a scalable and efficient way to manage access for users and services across our AWS infrastructure. In this chapter, we will learn about secure access management within the AWS cloud using IAM policies and IAM roles.
AWS supports various policy types, such as identity-based policies, resource-based policies, session policies, permissions boundaries, service control policies (SCPs), and access control lists (ACLs). While we will learn most of these policy types with detailed recipes. ACLs are only discussed theoretically since ACLs...