Day8βββUnleashing the Power of AWS Identity and Access Management (IAM) Service! πͺ
Table of contents
- π Synopsis
- π Prerequisites
- π‘ Plan of Execution :
- π Business Requirement :
- π Business Requirement Implementation :
- π Business Requirement Solution :
- π What is IAM?
- π Identity and Access Management Means?
- π IAM Features :
- π How to Access AWS Resources?
- π₯³ conclusion:
- πThanks for Reading π
- Please follow me for more such contentπ
π Synopsis
In this blog, we will learn about how we get the Business requirements and how we implement them through an AWS Cloud.
π Prerequisites
π AWS Account
π Internet Connection
π‘ Plan of Execution
π₯³ conclusion
π‘ Plan of Execution :
π Business Requirement :
Raj got a new project from a client, to implement it effectively he would require a team like a developer, Tester and Architect for the initial setup. Obviously, Raj also would be getting some profit for delivering this project.
π Business Requirement Implementation :
Now Raj wants to implement the requirement and to provision these different users, How he can manage the access and set permissions based on their roles for all them?
π Business Requirement Solution :
For all the doubts that Raj has, He has only one solution in the cloud, by using IAM Service.
π What is IAM?
πIAM stands for Identity Access Management.
πIAM is a web service that helps to securely control access to AWS Resources.
πIAM is used to control who is Authenticated (signed in) and Authorized (has permissions) to use AWS Resources.
π Identity and Access Management Means?
π When we talk about Identityββ It has users, user groups, roles, IAM Resources and Temporary Security Credentials
π When we talk about Access Managementββ It has Policies and permissions, Managing & understanding Policies, and finally which permissions are required to perform what.
π IAM Features :
π Fine-Grained Access Control: In AWS we have 100βs of services, Once you get accessβββwe may get access to only a few resources that would be required to perform our tasks.
π Least Privilege Permissions: Can restrict a user to access only to required resources. E.g., (EC2-ReadOnly)
π Access Control: Only Authenticated users can authorize the resources based on conditions.
π Cost: AWS Offers this service with additional cost, It's Free.
π How to Access AWS Resources?
π By Using IAM, we can access the AWS Cloud Services and Resources. To access them, either Raj or any user who wants to use AWS services, they have to connect by IAM Resource.
π Note: By default, all access inside the cloud is explicitly denied.
π₯³ conclusion:
we have basic insights about the business requirement, how we can implement in the cloud, IAM Features and how we can access the AWS services and resources.
πThanks for Reading π
π I want to express my heartfelt appreciation to every one of you who took the time to read my blog. I am truly grateful for your presence on this learning journey. π
π‘ I would also like to extend an open invitation for feedback. As I continue to share my knowledge and insights, I understand that growth comes from acknowledging and learning from our mistakes. So, if you spot any errors or have suggestions for improvement, I genuinely encourage you to correct me.
Please follow me for more such contentπ
Subscribe to my newsletter
Read articles from Rajaram Erraguntla directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
Rajaram Erraguntla
Rajaram Erraguntla
Iβm Rajaram Erraguntla, a dedicated and enthusiastic cloud professional with a strong desire to share my knowledge and expertise with others. Throughout my journey in the world of cloud computing, I have encountered numerous challenges and obstacles. However, these experiences have shaped me into a resilient and determined individual, constantly seeking growth and improvement. I Have recently started writing blogs on the medium(https://medium.com/@rajaram.erraguntla), LinkedIn(https://www.linkedin.com/in/rajaramerraguntla/) to regular updates of all my latest cloud stories.