Book Image

Amazon EC2 Cookbook

Book Image

Amazon EC2 Cookbook

Overview of this book

Discover how to perform a complete forensic investigation of large-scale Hadoop clusters using the same tools and techniques employed by forensic experts. This book begins by taking you through the process of forensic investigation and the pitfalls to avoid. It will walk you through Hadoop’s internals and architecture, and you will discover what types of information Hadoop stores and how to access that data. You will learn to identify Big Data evidence using techniques to survey a live system and interview witnesses. After setting up your own Hadoop system, you will collect evidence using techniques such as forensic imaging and application-based extractions. You will analyze Hadoop evidence using advanced tools and techniques to uncover events and statistical information. Finally, data visualization and evidence presentation techniques are covered to help you properly communicate your findings to any audience.
Table of Contents (15 chapters)
Amazon EC2 Cookbook
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Index

Introduction


AWS Identity and Access Management (IAM) enables centralized control to secure access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use fine-grained permissions to allow and deny their access to AWS resources.

In this chapter, we present recipes for using AWS IAM to create users and roles, and assign appropriate permissions to securely access AWS services. Users can also be added to a group using the IAM groups feature and permissions can be assigned at the group level. You can integrate your on-premise active directory with IAM. You can also assign policies to users, groups, and roles where the policies contain one or more permissions. Finally, we present a recipe to configure multifactor authentication (for enhanced security) to access certain AWS services.