Content of Figures
In keeping with the transformational change that is occurring as increased digitalisation impacts all industry sectors, AWS has extended the identity ...Login Get full Access
2 Product Description
In the past, when AWS referenced IAM they typically referred to providing access control to system functions within the AWS environment i.e. managemen ...
With the recent expansion of the IAM facilities in the AWS platform it’s not only possible to exert more control over system accounts, application u ...Login Get full Access
2.1 IAM Users
AWS IAM provides the ability to create user accounts and establish their login credential requirements. In some cases, this will be just a password, i ...
Note: AWS does not provide provisioning workflows; clients can either synchronise their on-premise AD or deploy an identity manager solution with conn ...Login Get full Access
2.2 Password Policy
AWS provides the facility to set a policy to control password length and strength, expiration, history and whether or not users can change their own p ...
AWS has 5 pre-defined password policy settings. Each setting can have a different profile i.e. a different password strength requirement and is assign ...Login Get full Access
2.3 IAM Roles & Permissions
Roles are a simple but powerful way that AWS provides for entitlement management. An IAM role has a set of defined entitlements (permissions) and mult ...
Roles are also useful in managing access by business partners. By assigning a role to a user’s account the permissions associated with the role are ...Login Get full Access
2.4 IAM Groups
AWS provides a group management facility in addition to role management. Access control by groups is often used to manage user access to specific appl ...Login Get full Access
2.5 Delegated System Administration
Another improvement is the ability to manage directory administrators for on-premises facilities. In the past, AD admins would manage elevated privile ...Login Get full Access
2.6 IAM Policy Management
IAM policies provide the capability to determine whether a user has permission to access a requested resource and determine what they are allowed to d ...Login Get full Access
2.7 Multi-factor Authentication
A single factor system typically relies on a password credential for a user login. Two factor systems add ‘something you have’ such as a mobile de ...Login Get full Access
AWS IAM fully supports SAML 2.0 for federation with remote identity providers. It is not necessary to establish all users in the AWS directory service ...Login Get full Access
3 Strengths and Challenges
The AWS identity management functionality is a welcomed extension to the AWS platform. It recognizes the importance of protecting computing facilities ...Login Get full Access