BCSE355 AWS Session3
BCSE355 AWS Session3
& IAM
02/05/2025 BCSE355_AWS 2
AWS Shared Responsibility Model
02/05/2025 BCSE355_AWS 3
AWS Shared Responsibility Model
02/05/2025 BCSE355_AWS 4
AWS responsibility: Security
of the cloud
02/05/2025 BCSE355_AWS 5
AWS responsibility: Security
of the cloud
02/05/2025 BCSE355_AWS 6
Customer responsibility: Security
in the cloud
02/05/2025 BCSE355_AWS 7
Service characteristics
and security responsibility
02/05/2025 BCSE355_AWS 8
Service characteristics
and security responsibility
Infrastructure as a service (IaaS) refers to services that provide basic building
blocks for cloud IT, typically including access to configure networking,
computers (virtual or on dedicated hardware), and data storage space.
Cloud services that can be characterized as IaaS provide the customer with the
highest level of flexibility and management control over IT resources.
IaaS services are most similar to existing on-premises computing resources that
many IT departments are familiar with today
Amazon EC2: can be categorized as IaaS and thus require the customer
to perform all necessary security configuration and management tasks.
Customers who deploy EC2 instances are responsible for managing the guest
operating system (including updates and security patches), any application
software that is installed on the instances, and the configuration of the security
groups that were provided by AWS
02/05/2025 BCSE355_AWS 9
Service characteristics
and security responsibility
Platform as a service (PaaS) refers to services that remove the need for
the customer to manage the underlying infrastructure (hardware,
operating systems, etc.).
02/05/2025 BCSE355_AWS 10
Service characteristics
and security responsibility
02/05/2025 BCSE355_AWS 12
Activity – 1
02/05/2025 BCSE355_AWS 13
Activity – 2
02/05/2025 BCSE355_AWS 14
Activity – 2
02/05/2025 BCSE355_AWS 15
AWS Identity and Access
Management (IAM)
IAM : allows you to control access to compute, storage, database, and
application services in the AWS Cloud
02/05/2025 BCSE355_AWS 16
IAM: Essential
components
02/05/2025 BCSE355_AWS 17
Authenticate as an IAM
user to gain access
• When you define an IAM user, you select what
types of access the user
02/05/2025 BCSE355_AWS 18
Authorization: What
actions are permitted
02/05/2025 BCSE355_AWS 19
IAM: Authorization
02/05/2025 BCSE355_AWS 20
IAM policies
02/05/2025 BCSE355_AWS 21
IAM policies
Identity based policies can
be further categorized as
Managed policies –
Standalone identity-based
policies that you can attach
to multiple users, groups,
and roles in your AWS
account
02/05/2025 BCSE355_AWS 22
IAM groups
02/05/2025 BCSE355_AWS 23
IAM roles
02/05/2025 BCSE355_AWS 24
Best practice
recommendations
• Secure logins with multifactor authentication (MFA)
• Delete account root user access keys.
• Create individual IAM users and grant permissions
according to the principle of least privilege.
• Use groups to assign permissions to IAM users.
• Configure a strong password policy.
• Delegate using roles instead of sharing credentials.
• Monitor account activity using AWS CloudTrail.
02/05/2025 BCSE355_AWS 25
AWS Services/ Components
• AWS CloudTrail
• CloudTrail tracks user activity on your account.
• Logs all API requests to resources in all supported services
your account
• Billing reports
• Provide information about your use of AWS resources and
estimated costs for that use
• AWS Cost and Usage Report
• Tracks your AWS usage and provides estimated charges
associated with your AWS account, either by the hour or
by the day
02/05/2025 BCSE355_AWS 26
Review Question - 1
02/05/2025 BCSE355_AWS 27
Review Question - 1
02/05/2025 BCSE355_AWS 28
Review Question – 2
02/05/2025 BCSE355_AWS 29
Review Question – 2
02/05/2025 BCSE355_AWS 30
References
• https://aws.amazon.com/compliance/shared-responsibility-model/
• https://
docs.aws.amazon.com/wellarchitected/latest/security-pillar/shared-r
esponsibility.html
• https://
docs.aws.amazon.com/IAM/latest/UserGuide/introduction.html
• https://
docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
02/05/2025 BCSE355_AWS 31