Section 1: IAM and AWS – Critical Concepts, Definitions, and Tools
Identity is the most granular unit of security. To ensure the confidentiality, integrity, and availability of a system, that system's infrastructure, applications, APIs, and endpoints must all be identifiable, authenticated, and authorized in order to perform its functions. The AWS platform operates under a rigid identity-centric model. Bridging that model with your own organization's identity implementation can be daunting. At the end of this section, you will understand the industry-standard and AWS-specific IAM terminology that will be referenced throughout this book. You will also learn about best-practice access management patterns and the tools available to implement said patterns within AWS.
This part of the book comprises the following chapters:
- Chapter 1, An Introduction to IAM and AWS IAM Concepts
- Chapter 2, An Introduction to the AWS CLI
- Chapter 3, IAM User Management ...