6_Managing Access Permissions at Scale with IAM

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

flashcard set

Earn XP

Description and Tags

Flashcards on AWS IAM management strategies like IAM groups, RBAC, and ABAC.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

What is the main challenge of managing individual access permissions at scale?

Managing individual permissions becomes increasingly difficult to maintain as things change, leading to increased effort and potential errors.

2
New cards

How do IAM groups simplify permission management?

IAM groups allow you to attach permissions to multiple users at once, simplifying permission management.

3
New cards

Can you sign in with an IAM group?

IAM groups do not have security credentials and cannot be used to sign in.

4
New cards

Can IAM groups be nested?

Users can belong to more than one group, but groups cannot be nested.

5
New cards

What happens when a user has a policy that is more restrictive than their group policy?

Permissions directly attached to a user override group permissions if the user policy is more restrictive.

6
New cards

What is Role-Based Access Control (RBAC)?

Role-Based Access Control (RBAC) involves creating IAM policies for job roles and putting users into groups based on their job functions.

7
New cards

What is a disadvantage of RBAC?

Each new resource added to multiple roles requires updating each of the policies that need access.

8
New cards

What is Attribute-Based Access Control (ABAC)?

Attribute-Based Access Control (ABAC) defines permissions based on attributes (key-value pairs).

9
New cards

What are attributes called in AWS?

Tags

10
New cards

Where can tags be applied and for what purposes?

Tags can apply to IAM users/roles and AWS resources, and can be used for access control, billing, and filtering views.

11
New cards

What are the steps to apply ABAC to your organization?

Create IAM users/roles and assign attributes, require attributes for all new resources, and configure access permissions based on those attributes.