Content ITV PRO
This is Itvedant Content department
Learning Outcome
6
Learn about users, access keys, and MFA
5
Understand shared security responsibility.
4
Understand authentication and authorization
3
Identify the main parts of IAM
2
Know why IAM is important for security
1
Understand what AWS IAM is
Bank Locker Analogy
Imagine a Bank Locker
Many customers use the same bank
Each customer has their own locker
Only authorized people can open a locker
Access is strictly controlled and monitored
In the same way, IAM works like a bank locker security system for AWS
Multiple users share the same cloud environment, but each user gets controlled, secure access only to what they are allowed to use.
Before Diving to the AWS IAM
Lets know
Authentication And Authorization
Authentication answers the question: “Who are you?”
It checks and verifies your identity before giving access.
Authorization
Authorization answers the question “What can you do?”
It decides what actions you’re allowed to perform after your identity is verified.
Example :
You can open only your locker
You cannot open someone else locker
Bank Locker
Similarly, authorization ensures you can access only what you are permitted to, nothing more.
Introduction to AWS IAM (Identity and Access Management)
AWS IAM (Identity and Access Management) is a security service that controls who can access AWS resources.
It makes sure that only authorized people or systems can use AWS services.
Allow you to create and manage users,groups and roles
Components of IAM
IAM has different parts that work together to manage access safely
User
Users are people or systems that need access.
Groups
Groups are a way to organize users who need the same type of access.
Instead of giving permissions one by one, access is assigned to the group.
Roles
Roles provide temporary access to users or systems for a specific task.
Policies
Policies are rules that decide what actions are allowed and what are denied.
Features of IAM
IAM has several features that enhance the security AWS
AWS Root User Account
What to Know
The original account made when you sign up for AWS
Grants complete access to all AWS services and resources for that account
Created using your registered email address and password
Provides full admin privileges, including billing, account settings, and IAM management
Root User Permissions
Manage billing and payment settings
Change account security settings
Access all AWS resources without listing
Users In IAM
IAM users are individual identities created to access AWS.
They help identify, track, and control who is using the system
They represent people or applications that need access.
Each user has unique login credentials (username, password, or access keys)
Permissions decide what the user can and cannot do
How to create IAM User
Access Keys and Secret access key
Access Keys and Secret Access Keys are digital credentials used by applications or automated systems, not humans.
They allow software to securely access services without manual login.
Digital credentials used by applications or automated systems, not humans.
Allow software to securely access services without manual login.
MFA (Multi-Factor Authentication)
MFA (Multi-Factor Authentication) adds an extra layer of security to your account.
Even if someone knows your password, they cannot log in without the second factor (such as an OTP).
Steps to add MFA in AWS
Why IAM is important
IAM (Identity and Access Management) is important because it controls who can access what in a system
By giving only the required permissions, IAM reduces the risk of data misuse, accidental actions, and unauthorized access.
5
MFA adds strong protection
4
Authorization controls action
3
Authentication checks identity
2
Users, groups, roles, and policies manage permissions
1
IAM controls who can access AWS
Quiz
IAM is mainly used for
A. Storage
B. Networking
C. Security
D. Billing
Quiz-Answer
A. Storage
B. Networking
C. Security
D. Billing
IAM is mainly used for
Quiz
MFA provides
A. Extra storage
B. Extra security
C. Extra user
D. Extra cost
Quiz-Answer
B. Extra security
B. Extra security
MFA provides
A. Extra storage
C. Extra user
D. Extra cost
By Content ITV