AWS Identity & Access Management

0.0(0)
studied byStudied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:16 AM on 6/17/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

36 Terms

1
New cards

IAM

Identity and Access Management, It lets you create and manage users, groups, roles, and permissions to control who can do what in your AWS environment.

2
New cards

Root account

Default AWS account created with AWS setup; should not be used or shared.

3
New cards

Why shouldn't the root account be used?

It's a best practice to avoid using the root account because it has full, unrestricted access and cannot be limited—using it increases the risk of accidental or malicious changes.

4
New cards

User (IAM)

An individual identity in AWS with specific credentials (username, password, access keys) used to access and interact with AWS services.

5
New cards

Group (IAM)

A collection of users; cannot contain other groups.

6
New cards

Can users belong to multiple groups?

Yes, users can belong to multiple groups or none at all.

7
New cards

Why create users and groups in AWS?

To control access per person and assign permissions efficiently to a collection of people.

8
New cards

Policy (IAM)

JSON documents that define permissions for users or groups.

9
New cards

What principle should policies follow in AWS?

Least privilege—users get only the permissions they need.

10
New cards

What is IAM policy inheritance?

Users inherit policies attached to their group.

11
New cards

What are inline policies in IAM?

they are policies directly attached to a single user, group, or role, and they do not apply to others. They're used for one-to-one permission assignments.

12
New cards

What are the main components of an IAM policy?

Version, Id (optional), Statement(s).

13
New cards

What does an IAM policy Statement include?

Sid (optional), Effect (Allow/Deny), Principal, Action, Resource, Condition (optional).

14
New cards

What is the recommended version for IAM policies?

"2012-10-17"

15
New cards

What can AWS password policies enforce?

Minimum length, character types, password changes, expiration, reuse prevention.

16
New cards

What is MFA in AWS?

is an extra layer of security that requires users to provide a second form of verification (like a code from a phone or hardware device) in addition to their password when signing in.

17
New cards

Why use MFA?

To enhance account security by requiring a second verification step, reducing the risk of unauthorized access.

18
New cards

What is a U2F security key?

is a physical USB device used for two-factor authentication.

19
New cards

How can users access AWS?

AWS Management Console (password + MFA), AWS CLI (access keys), AWS SDK (access keys).

20
New cards

What are access keys in AWS?

are a pair of credentials (Access Key ID and Secret Access Key) used by IAM users to programmatically access AWS services via the CLI, SDKs, or APIs.

21
New cards

How should access keys be treated?

As secrets; never share them.

22
New cards

What is the AWS CLI?

A command-line tool to interact with AWS services via public APIs. It is used to script and manage AWS resources as an alternative to the Console.

23
New cards

What is the AWS SDK?

is a set of tools and libraries that enables developers to interact with AWS services using programming languages, making it easier to integrate AWS into applications.

24
New cards

What is AWS CloudShell?

is a browser-based, pre-configured command-line environment provided by AWS, allowing users to manage AWS resources securely without needing to install or configure the AWS CLI locally.

25
New cards

Why do some AWS services need IAM roles?

Some AWS services need IAM roles to securely access other AWS resources on your behalf. Roles grant temporary permissions without exposing long-term credentials, ensuring secure, controlled access based on defined policies.

26
New cards

What is an IAM role?

is an AWS identity with specific permissions that can be assumed by users, applications, or services to securely access AWS resources without using permanent credentials.

27
New cards

What is the IAM Credentials Report?

is a downloadable report in AWS that provides detailed information about all IAM users and the status of their credentials, such as passwords, access keys, and MFA settings, helping with security auditing.

28
New cards

What does IAM Access Advisor (last-access) show?

shows the last time an IAM user or role accessed specific AWS services, helping identify unused permissions to improve security by refining access policies.

29
New cards

What is the recommended user-to-AWS-user ratio?

One physical user should have one AWS user account.

30
New cards

How should permissions be assigned?

Assign users to groups, and assign permissions to groups.

31
New cards

What security feature should be enforced on IAM users?

Multi-Factor Authentication (MFA).

32
New cards

When should you use IAM Roles?

To give permissions to AWS services securely.

33
New cards

What is the use of Access Keys?

For programmatic access via CLI and SDK.

34
New cards

How do you audit AWS permissions?

Use IAM Credentials Report and IAM Access Advisor.

35
New cards

What security responsibilities does AWS have and what responsibilities does the user have ?

  1. AWS

    1. Infrastructure (global network security)

    2. Configuration and vulnerability analysis of their services

    3. Compliance validation

  2. You

    1. Users, Groups, Roles, Policies management and monitoring

    2. Enable MFA on all accounts

    3. Rotate all your keys often

    4. Use IAM tools to apply appropriate permissions

    5. Analyze access patterns & review permissions

36
New cards

What is recommended for key management?

Rotate all your keys often.