Access Management
The previous chapters focused more on what gets protected. This chapter begins the discussion on the who, which is not who gets protected but rather what permissions users and groups are allocated. Access management starts with segmenting users into groups so that they can be managed more effectively.
This chapter will help you with confidently implementing and managing access controls across various authentication mechanisms and will ensure you have a thorough understanding of all principles of permission-based access policies. You will also learn about some of the specific services and features in place that are designed to enrich and enhance the access control method selected.
In this chapter, you will learn how identities in the AWS Identity and Access Management system are authenticated and authorized. This allows the identities to perform their tasks in an appropriate manner that then becomes auditable.
The following main topics will be covered in this...