CC PPT 2
CC PPT 2
Controls in AWS
AWS Identity and Access Management (IAM)
It is a fundamental component of Amazon Web Services (AWS) that enables
you to manage access to AWS services and resources securely. With IAM,
administrators can centrally control access, monitor user activity, and
integrate identity management seamlessly into their AWS environment.
• Role-based Access Control : IAM roles are used to grant permissions to
entities such as AWS services or applications, allowing them to access
resources securely without the need for permanent credentials.
• Security Features : IAM provides security features like Multi-factor
Authentication (MFA) for added protection, access keys for programmatic
access, and identity federation for integrating with external identity
providers.
AWS IAM Identity Center
• The AWS IAM Identity Center is a centralized management console
within AWS Identity and Access Management (IAM) that facilitates the
administration of user identities, groups, roles, and permissions across AWS
services securely.
• User Management : The IAM Identity Center allows administrators to
create, modify, and delete user accounts, set user passwords, manage user
permissions, and assign roles based on job responsibilities or organizational
hierarchies.
• Audit and Monitoring : The Identity Center offers audit logs and
monitoring capabilities, enabling administrators to track user activity,
changes to permissions, and security events for compliance, auditing, and
troubleshooting purposes.
Route Tables, Security Groups, and Network
ACLs
Route Tables
• Route Tables in AWS are used to define rules for
routing network traffic between subnets, virtual
private clouds (VPCs), and the internet.
• They determine how inbound and outbound traffic is
directed within a VPC or between a VPC and external
networks.
• Each route table contains entries called routes, which
specify the destination for traffic (CIDR block) and
the target (e.g., internet gateway, virtual private
gateway, or another instance in the VPC).
Route Tables, Security Groups, and Network
ACLs
Security Groups
• Security Groups act as virtual firewalls that
control inbound and outbound traffic for EC2
instances, databases, and other resources within a
VPC.
• They enforce network access controls by allowing
or denying traffic based on defined rules.
• Security Groups consist of inbound and outbound
rules that specify allowed traffic based on IP
protocols (e.g., TCP, UDP, ICMP), port numbers,
and source/destination IP addresses or CIDR
blocks.
Route Tables, Security Groups, and Network
ACLs
Network ACLs
• Network ACLs are another layer of security that operate
at the subnet level within a VPC, controlling inbound
and outbound traffic similar to Security Groups but with
additional granularity.
• They provide a rule-based mechanism to allow or deny
traffic based on IP addresses, protocols, port ranges, and
traffic direction (inbound or outbound).
• Network ACL rules are evaluated in order from lowest
to highest rule number, and the first matching rule
(based on the rule number, protocol, and port) is applied.
AWS Key Management System
• AWS Key Management Service (KMS) is a managed service that enables users
to create and control cryptographic keys used to encrypt and decrypt data across
AWS services and applications.
Using services like AWS Elastic Load Balancing (ELB) and Auto Scaling
to automatically redirect traffic and scale resources as needed.