Discover and read the best of Twitter Threads about #AWSIAM

Most recents (5)

Understanding the most important and critical part of AWS Identity and Access Management -

"The IAM Policies"

A Thread 👇 PS: https://spaceliftio.wpc...
Hey Twitterverse!

Today, let's dive into the fascinating world of AWS Identity and Access Management (IAM) policies. IAM policies define permissions for AWS resources. Let's explore different types of IAM policies and see some examples. #IAM #AWS
1. First up, we have the "AWS managed policies." These are policies created and managed by AWS. They cover common use cases and are maintained by AWS to ensure compliance and security.

For example, "AmazonS3ReadOnlyAccess" allows read-only access to Amazon S3 resources.
Read 13 tweets
AWS IAM Explained with Examples!

A Thread 👇 PS: https://www.howtogeek.c...
1/6 🔒 What is AWS IAM? 🔒

AWS Identity and Access Management (IAM) is a service that enables you to securely control access to your AWS resources. IAM allows you to manage users, roles, and policies to define and enforce permissions for accessing your AWS services.
2/6 👥 Users
In IAM, users represent individual people or entities dat need to interact with ur AWS resources. Users r assigned unique creds, such as access keys, to authenticate themselves when accessing AWS services.

For Eg: @johndoe is a user with access to EC2 instances. Image
Read 17 tweets
🏇 Starting in a few minutes: "Building for the future with @AWSIdentity Services" with Karen Haberkorn, Director of Product Management for AWS Identity 💫 I'll be tweeting the highlights. @AWSIdentity @AWSSecurityInfo #reInforce Image
1/ Building for the future with @AWSIdentity Services: Karen notes our exceptional year - not just for humans, but also for companies, who have shifted to accommodate remote work; a shift to remote identities and their access controls. @AWSIdentity @AWSSecurityInfo #reInforce
3/ "ZT is a conceptual model and an associated set of mechanisms that focus on providing security controls around digital assets that do not solely or fundamentally depend on traditional network controls or network perimeters." @AWSIdentity @AWSSecurityInfo #reInforce
Read 29 tweets
1/ 🚀🚀🚀IAM actions last accessed by users or roles your AWS account: in addition to S3 mgmt actions, you now can see when Amazon EC2, AWS IAM, and AWS Lambda actions were last used! Here I can see that I just attempted a DeleteRole & DeletePolicy in the #AWSIAM service:
2/ In addition to viewing actions last accessed in the console, you can also view them programmatically for the services that support it, see (boto3 docs): boto3.amazonaws.com/v1/documentati…
3/ For some IAM console and AWS CLI examples, read more about this on the AWS Security Blog: aws.amazon.com/blogs/security…
Read 3 tweets
⏱️Starting now! ⏱️ @AWSIdentity – presenting our session SEC316 with Brigid @bjohnso5y on Access Control Confidence. 💪⚡ I will be live tweeting the highlights!
@AWSIdentity @bjohnso5y Access control is a journey towards least privilege. Brigid is going to share with us how to make it a confident one.
@AWSIdentity @bjohnso5y Access control confidence. Brigid breaks it down into three parts – permission guardrails, attribute-based access control, and reining in permissions using analytics.
Read 22 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!