In this chapter, we will be covering the core security service of AWS—AWS IAM. Identity and Access Management, referred to as IAM, is a central part, which surrounds all AWS services. For an enterprise, big or small, data security is the most important aspect that needs to be tightened. In this chapter, we will demonstrate how we can create and administer IAM users, groups, roles, and policies using AWS Management Console, AWS CLI, AWS SDK – Java, and CloudFormation.
In this chapter, we will cover the following topics:
- Policies
- Roles
- Groups
- Users
Identity and Access Management (IAM) is the most important service of the AWS cloud. It is used to provide access to other AWS resources. Each AWS resource has access restrictions and permissions that are being governed by IAM. It allows us to provide granular-level permissions to users or AWS resources...