O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing SQS

In SQS, we define security using IAM for authentication and access control and SSE. Let's see both methods in detail:

  • Authentication and access control—access to SQS requires users to get authenticated with AWS Console and have sufficient privileges to access the services. For authentication, we can have the following identities:
    • IAM root user: It's strongly recommended not to use root user.
    • IAM user: These are the IAM users who have permission to access SQS services and messages.
    • IAM roles: IAM role is same as IAM user, but it's not associated with the account. It is associated with the service that you want to access via temporary access keys.
  • For access control, we have the SQL resource-based access policy, which is defined ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required