O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IAM roles

IAM roles are the most secure way to assign access permission to the entity you trust. It generates a short-term token to provide authentication. There are many roles already predefined in AWS IAM, and it also enables us to create custom roles.

 

In the following screenshot, we can see that there are already a few service-specific roles defined: 

Now, let's see the Database Migration Service (DMS) migration roles, which are custom roles that I have created for the DMS. Here, you can see that there are seven policies associated with this role, and required for the DMS:

Now, let's see the policies associated with this role, which ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required