O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using IAM

We use IAM to ensure the security of RDS. We use IAM policies to control the RDS actions to specially create, modify, and delete the RDS database, RDS security groups, option groups, and parameter groups. Apart from this, we also control the backup and restore operations for the database.

There are many predefined policies available in the IAM management console, which you can access in the Policy section:

Let's see inside a predefined IAM policy for RDS named AmazonRDSReadOnlyAccess:

{ "Version": "2012-10-17", "Statement": [ { "Action": [ "rds:Describe*", "rds:ListTagsForResource", "ec2:DescribeAccountAttributes", "ec2:DescribeAvailabilityZones", ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required