Chapter 3: Identity and Access Management and Working with Secrets in AWS
With a firm understanding of a myriad of fundamental services under our belt, we now move on to Identity and Access Management (IAM).
Defining the controls and policies that are used to manage access to different Amazon Web Services (AWS) services is what the premise of IAM is all about. This can come in the form of users, groups, policies, and even access, with federated access or short-term credentials. There is also the ability to use outside identity providers (IdPs) to allow users to access your applications. Understanding how to secure secrets using native AWS tools, especially in the context of a continuous development (CD) process, is an enterprise-level skill that is not only present in the DevOps professional exam, but also on the job.
In this chapter, we're going to cover the following main topics:
- Understanding the Shared Responsibility Model in AWS
- IAM roles, groups, users...