Introduction to AWS Cloud

IAM User & IAM Role

Learning Outcome(Slide2)

5

Apply IAM best practices and security features correctly

 

4

Understand IAM policies, roles, and their real use cases

 

3

Differentiate authentication and authorization clearly

2

Explain all IAM components with examples

1

Understand what IAM is and why it is required in cloud

Earlier, we learned:

Cloud computing allows us to use resources over the internet

Cloud environments are shared and accessible online

Before using cloud resources, we must understand
- how access is controlled and secured, which is done using IAM.

 

Hook/Story/Analogy(Slide 4)

In a company:

  • Every employee does not have access to all systems

  • An HR person cannot access finance systems

  • An intern does not get admin access

Access is given based on role and responsibility.

 

IAM works the same way for AWS cloud.

Transition from Analogy to Technical Concept(Slide 5)

Now let’s understand

 how AWS controls access
and how IAM manages users, permissions, and security.

Inside the Concept

How can you combine two arrays?

In Javascript, we can combine two arrays by mean of concat() method

Syntax:

arr1.concat(arr2)

let arr1 = ["a", "b"];
let arr2 = ["c", "d"];

let result = arr1.concat(arr2);
["a", "b", "c", "d"]

Note:  

Returns a new array

Original arrays remain unchanged

 

What is IAM & Why It Is Needed

IAM (Identity and Access Management) is a service that helps you securely manage who can access cloud resources and what they can do.

IAM is needed because:

  • Multiple users and applications work in one cloud account

Giving full access to everyone is risky

Unauthorized access can cause data loss and high cost

Example:
- If every user can delete servers, one mistake can shut down the whole system.

IAM ensures:

  • Security

  • Controlled access

  • Accountability

Problems Without IAM

Without IAM:

  • Everyone may use the main (root) account

  • No control over permissions

  • No record of who performed which action

  • High chance of security breaches

IAM solves these problems by defining clear access rules.

IAM Components

IAM is built using four main components that work together.

IAM User (MAIN ENTITY)

IAM Groups

IAM Policies

IAM Roles

IAM Components

1. IAM User (MAIN ENTITY)

IAM User represents a real person who accesses AWS.

Key points:

  • Created after account setup

  • Used instead of root user

  • Has unique login credentials

  • Has specific permissions

IAM Components

IAM Groups

IAM Group is a collection of IAM users.

Key points:

  • Permissions are attached to the group

  • All users in the group get same permissions

  • Easy to manage many users

Example:
All developers are added to a “Developers” group with EC2 access.

Core Concepts (.....Slide N-3)

Core Concepts (.....Slide N-3)

Summary

5

Build strong branding

4

Use different marketing channels

3

Target the right audience

2

Create and communicate value

1

Understand customer needs

Choose cool, soft colors instead of vibrant colors
Max 5 Points for Summary & Min 2

Quiz

Which platform is mainly used for professional networking and B2B marketing ?

A. Facebook

B. Instagram

C. LinkedIn

D. Snapchat

Quiz-Answer

Which platform is mainly used for professional networking and B2B marketing ?

A. Facebook

B. Instagram

C. LinkedIn

D. Snapchat