3
Identity and Access Management – Securing Users, Roles, and Policies
Welcome to the third chapter of our deep dive into AWS security. In this chapter, we will focus on AWS Identity and Access Management (IAM), which is the backbone of AWS security. We will embark on a journey where we will cover the foundational access control models, such as RBAC and ABAC, and their pivotal role in AWS. Transitioning from there, we will explore the vast landscape of IAM identities, shedding light on both human and non-human identities, the nuances of various credential types, and the detailed workings of IAM users, groups, roles, and externally managed identities. As we progress, IAM policies will come to the forefront, where we will discuss everything from ...
Get Mastering AWS Security - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.