Managing Identity and Access
The first security aspect to consider for your application is the credentials and the associated permissions that are necessary both for the application components to do their jobs and for the end users to be able to interact with the application.
IAM Users and Roles
The complete set of features available on AWS for identity and access management (IAM) was already discussed in Chapter 1, Determining an Authentication and Access Control Strategy for Complex Organizations, but here a quick recap of the major concepts for this chapter’s discussion. If, at any moment, you feel you need more information to fully understand this part, please refer to Chapter 1, Determining an Authentication and Access Control Strategy for Complex Organizations.
When designing your application on AWS, you will leverage one or more AWS services to fulfill its mission. Accessing those services requires permissions, thus you must provide the necessary credentials...