05 - Identity Access Management - IAMLab
05 - Identity Access Management - IAMLab
Create a Password policy on the AWS Account as per the below reccomendations
Account Alias:
--------------
--> Account Alias is an alternative name to the Account ID, whihc can be used at
the time of IAM User Sign-IN
6. Create an IAM user "user1" with Full access on the entire AWS Account by
attaching an IAM policy "Administrator Access"
Note: There are 3 different ways that we can provide permissions to the users
- Check that the user1 can see all the list of users
- Create a new IAM user as "user1"
- Navigate to EC2 service, create a security Group
8. Create an IAM user "user2" with readonly permission on IAM Service only -By
attaching the policy directly to the user
9. Login as "user2" and verify the readonly permissions on IAM Service only
10. Cretae a new IAM Policy (Custom Policy), which can provide Full access on EC2
service.
11. Cretae a user "user3" and attach the above created custom policy
"EC2FullAccess". Use tags while creating the user
--> Tag is a Key-Value Pair, which can be used for Identification purpose.
13. Provide extra permissions "ReadOnly Access on All services" to an exisitng user
"user0" - By attaching a policy
NOTE: AWS will generate an ARN for every resource, ARN is a unique identification
of every resource
arn:aws:iam::aws:policy/AdministratorAccess
arn:aws:iam::767397901250:policy/EC2FullAccess
--> We can attach Multiple Policies to the users, so that they can both the
policies applied.
--> IAM SUpports, Deny Policies. Which can be used to deny specific permissions to
a user.
--> Always, Deny Policy has the highest priority over Allow Policy
15. Create a Deny Policy "IAMFullAccess-Deny", which can deny all actions on IAM
Service
16. Attach the Deny Policy to user "user0" and verify the Final Permissions
Observation:
UserGroup:
----------
--> We can add Users into the Group, and Nested groups are not possible.
--> An User can be a part of Multiple Groups, And the permissions from Multiple
groups can be applied to the user.
--> We can attach a policy to the user, and the same user can be a part of a Group.
1. Create a userGroup "EC2Admins", and attach a policy which can provide Full
access On EC2 service.
2. Create a New user "user4" and add the user to the group "EC2Admins"
Tasks:
------
1. Create a new user "user5" and copy the permissions from an exisitng user "user1"
2. Create a new Group "IAMReadUsers" and attach a policy which can provide Readonly
Access on IAM Service.
Access Advisor:
---------------
--> Access Advisor shows the services that this user can access and when those
services were last accessed.
--> It will display the list of services, not accessed in the tracking period
--> We can review what services are used by the user, and we can remove the
permissions whihc are not required.
--> Access Advisor cannot display who created what servcies and all, as access
advisor is not an auditing tool.
NOTE: Cloudtrial is the servcie, by using whihch we can audit all the user
activities.
--> Any Administrator user, can reset the password for IAM User
1. Reset the password for "user1", To perform password reset login as any Admin
user.