Securing Access with AWS Identity and Access Management
Protecting AWS-hosted applications from unauthorized access is of paramount importance for any business. As an organization, you must ensure that only authorized entities can authenticate against your workloads. Furthermore, those entities must only be permitted to create and manage resources and perform tasks for which they are authorized. This concept is the principle of least privilege (POLP) and is fundamental to developing a secure environment. This chapter will teach you why authentication and authorization services are crucial. You will understand the importance of providing various access options to authenticate internal users and, where required, offer anonymous public access depending on the application use case.
In this chapter, you will learn about one of the foundational security services offered by AWS, identity and access management (IAM). You will learn how to create users, groups, and roles and how to grant...