A free FMS *(fully managed service) used to manage any type of authorisation to access resources on your AWS account. Control access with IAM users in AWS, or via Federation for 3rd Party authentication with OAuth
When you create IAM policies, follow the standard security advice of granting least privilege—that is, granting only the permissions required to perform a task. See: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#grant-least-privilege
The company IT has full responsibility for
You have to patch the OS, and ensure it's secure, and responsible for anything running on it.
You responsible for NW & FW, Data, db Admin, Data Encryption at rest and during transport.
You are responsible customer Data at client and server
Use least privileged access by default. I.e. User has no access
Users are setup with credentials (can add an Alias for easy user access). Users can be identified in 3 different ways in AWS:
If you want the URL for your users sign-in page to contain your company name (or other friendly identifier) instead of your AWS account ID, you can create an alias for your AWS account ID. See: https://docs.aws.amazon.com/IAM/latest/UserGuide/console_account-alias.html
An IAM group is a collection of IAM users. Groups let you specify permissions for multiple users, which can make it easier to manage the permissions for those users. - https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups.html
Groups can have permissions, or have AWS Policies. Each group contains users that gain the groups permissions
User can participate in multiple groups, but you can't have nested groups.
You can define Resource based security Groups. An EC2 security group acts as a firewall that controls the traffic allowed to reach one or more instances - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html
An IAM group is a collection of IAM users. Groups let you specify permissions for multiple users, which can make it easier to manage the permissions for those users. See: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups.html
You can and should use an IAM role to manage temporary credentials for applications that run on an EC2 instance. When you use a role, you don't have to distribute long-term credentials (such as a user name and password or access keys) to an EC2 instance. See: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2.html
Used for large Enterprises to be managed centrally, billed centrally under Service Control Policies (SCP's control access to AWS services within OU. The SCP overrides all other policies)
An Organisation Unit (OU) can have many AWS Accounts
User account management can be automated with API's.
Consolidated OU billing for multiple AWS accounts.
AWS Organizations provides consolidated billing so that you can track the combined costs of all the OU member accounts in your organization. See: https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/useconsolidatedbilling-procedure.html
Setup multiple "company groups" with an AWS Account, and check that don't exceed monthly spend. They will all report under the same OU AWS Account via a consolidated bill
By default new users have no access in AWS account. Everything has to be explicitly granted via XAML policies (define the version "date", effect "Allow", actions "S3:*", resources "via ARN", and optional conditions)
Notation(no AWS region info)
arn:aws:iam::account:resource{"user/Bob","goup/Dev","role/DymoDBAccess","instance-profile/Webserver","federated-user/Bob"}
Policies to control AWS Accounts PWD strength of Characters, length, valid for period, expiration, previous blocked PWDs
Force to contact Admin when locked out or PWD expired.
Policies for Users vs. Resources. The Resource has policy attached to the resource.
*ARN - Amazon Resource Name3rd Party OAuth(unlimited temporary credentials) is needed as there is limit to IAM users (max 5000)
Setup a AWS Role for Federated Users
Used to capture events on AWS Cloud to the resources, and can trigger SNS Topic alerts for security issues. All resource access is performed via AWS API so everything is logged. The logs are stored in a designated Bucket (that can be analysed by Amazon Athena, EMR etc).