Stepping into The World of Cloud Computing

IAM: Unlocking AWS Security 

Learning Outcome

6

Learn about users, access keys, and MFA

5

Understand shared security responsibility.

4

Understand authentication and authorization

3

Identify the main parts of IAM

2

Know why IAM is important for security

1

Understand what AWS IAM is

 Bank Locker Analogy

Imagine a Bank Locker 

Many customers use the same bank

Each customer has their own locker

Only authorized people can open a locker

Access is strictly controlled and monitored

In the same way, IAM works like a bank locker security system for AWS

Multiple users share the same cloud environment, but each user gets controlled, secure access only to what they are allowed to use.

Before Diving to the AWS IAM

Lets know

Authentication And Authorization

 Authentication answers the question: “Who are you?”

 It checks and verifies your identity before giving access.

 Authorization

 Authorization answers the question “What can you do?”

 It decides what actions you’re allowed to perform after your identity is verified.

Example :

You can open only your locker

You cannot open someone else locker 

Bank Locker 

Similarly, authorization ensures you can access only what you are permitted to, nothing more.

Introduction to AWS IAM (Identity and Access Management)

AWS IAM (Identity and Access Management) is a security service that controls who can access AWS resources.

It makes sure that only authorized people or systems can use AWS services.

Allow you to create and manage users,groups and roles 

Real World Example

A company uses AWS IAM to give developers access only to EC2 and S3, while the finance team can access billing details.

This ensures each employee can use only what they are authorized for, keeping AWS resources secure.

Components of IAM

IAM has different parts that work together to manage access safely

User

Users are people or systems that need access.

Groups

Groups are a way to organize users who need the same type of access.
Instead of giving permissions one by one, access is assigned to the group.

 Roles

Roles provide temporary access to users or systems for a specific task.

Policies

Policies are rules that decide what actions are allowed and what are denied.

Features of IAM

IAM has several features that enhance the security AWS 

AWS Root User Account 

What to Know

The original account made when you sign up for AWS

Grants complete access to all AWS services and resources for that account

Created using your registered email address and password

Provides full admin privileges, including billing, account settings, and IAM management

Real-World Example (AWS Root User Account)

An AWS root user account is like having the master key to your AWS account.
It has full access to everything, making it very powerful

This account is usually used by a company’s founder or IT administrator to manage the entire AWS environment, from billing to security.

 Root User Permissions

Manage billing and payment settings

Change account security settings

Access all AWS resources without listing

Differnece between Rootuser & IAM user

Users In IAM

IAM users are individual identities created to access AWS.

They help identify, track, and control who is using the system

They represent people or applications that need access.

Each user has unique login credentials (username, password, or access keys)

Permissions decide what the user can and cannot do

How to create IAM User

Access Keys and Secret access key

Access Keys and Secret Access Keys are digital credentials used by applications or automated systems, not humans.

They allow software to securely access services without manual login.

Digital credentials used by applications or automated systems, not humans.

Allow software to securely access services without manual login.

 MFA (Multi-Factor Authentication)

MFA (Multi-Factor Authentication) adds an extra layer of security to your account.

Even if someone knows your password, they cannot log in without the second factor (such as an OTP).

Types Of MFA

Virtual MFA

 

Uses an authenticator app (Google Authenticator, Authy, AWS Virtual MFA)

 

 

Generates a time-based OTP on your phone

 

 

Most commonly used and recommended by AWS

Hardware MFA

A physical device that generates OTPs

More secure than virtual MFA

Used in high-security environments

SMS-Based MFA

 

Sends OTP via SMS to your mobile number

 

 

Easy to use but less secure

 

 

Not recommended for critical accounts

 Steps to add MFA in AWS

  1. Sign in to the AWS Management Console

  2. Open AWS IAM (Identity and Access Management)

  3. Click Users in the left menu

  4. Select the user for MFA setup

  5. Open the Security credentials tab

6. Under Multi-Factor Authentication (MFA), click Assign MFA device

7. Choose Virtual MFA device (recommended)

8. Open an authenticator app on your phone

9. Scan the QR code displayed on the screen

10. Enter two consecutive OTPs generated by the app

11. Complete MFA setup

Why IAM is important

IAM (Identity and Access Management) is important because it controls who can access what in a system

By giving only the required permissions, IAM reduces the risk of data misuse, accidental actions, and unauthorized access.

Summary

5

MFA adds strong protection

4

Authorization controls action

3

Authentication checks identity

2

Users, groups, roles, and policies manage permissions

1

IAM controls who can access AWS

Quiz

IAM is mainly used for

A. Storage

B. Networking

C.  Security

D. Billing

Quiz-Answer

A. Storage

B. Networking

C. Security

D. Billing

IAM is mainly used for

Quiz

MFA provides

A. Extra storage

B. Extra security

C. Extra user

D. Extra cost

Quiz-Answer

B. Extra security

MFA provides

A. Extra storage

C. Extra user

D. Extra cost

Unlocking_Aws_security

By Content ITV

Unlocking_Aws_security

  • 44