Shared Responsibility Model

Indicates which part of security AWS and the client are responsible for. The responsibilities are, basically:

https://lh4.googleusercontent.com/HQb3Aa8prKCOu3pxCiQ31F3u_H2mpsTAaFGbEhI0oNLYirmfjyYMV11HLYTfgYUzFmg_izd3EQxW9l91ZNuU0_nUG5KRYAoZHv4CaSOn5L1qgNrl9bJ1rm08z-ocGURYnRu4QE8L

Service Types

Types of services:

AWS Identity and Access Management (IAM)

Allows you to define users and the types of access they have → Free and global service.

You assign policies and credentials to each user.

Components:

IAM User → Person/application allowed to access the AWS account. By default NO permissions (Principle of Least Privilege).

IAM Group → Collection of IAM users granted the same access. Permissions granted by IAM Policies. Users can have multiple groups.

IAM Policy → Document that defines access to one/more services, independent of groups/users. Permissions defined here.

IAM Role → Grant permissions to add multiple permissions, useful for TEMPORARY uses.

Types of Access:

Authorization → Determine permissions user/service should be granted, after authentication.

IAM Policies

Contents:

Wildcards (*) can be used to be more general.

https://lh6.googleusercontent.com/Vnx3looXuvkoNwQYLGT9RY8Hy4KMWjU3TzJivMV7u_nYasFhsvnNveGxlKVmCM-8pmvowPxTeCKGkhwszf1Z6zlIk_lKYSlsHnbTG19YIgvfCk1P1f99bBfdhRamfwCbQqGRdbVL

External Federation

The user authentication is performed by an external system or Identity Provider.

https://lh6.googleusercontent.com/j2U6x2ov5D6C8PYLsUPpyr710IXwEeNw3hPa1rGkJaBkQ9QUqjc39o_DZD_RnHQLHAJzHgdRQ9LDwM7Q_BbZSZXSHs1metRHQiQAEHMD2dao4ah4asYaG-TXnuduEWFYnuRgu3d4