O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identity and Access Management in the Cloud

In Chapter 1Introduction to Cloud Security, we read about the AAA model of security, where we saw that authentication and authorization are very critical points. In cloud, we defined the two parts, authentication and authorization, using IAM.

IAM stands for Identity and Access Management. It plays a critical role in security implementation in the cloud. Here, we define users, groups, roles, and policies.

In AWS, when we subscribe the services, we actually create a root account, which is single sign in for all the services.

In single sign in, we enter our user credentials once and we can move through all the connected applications without being prompted for user credentials. It's always advisable ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required