A Practical Guide to AWS IAM
Sign in
A Practical Guide to AWS IAM
Sign in
Introduction
Preview
Structure of this book
Preview
Access control basics
Preview
Access elements
CloudTrail logging
IAM Policies
Structure
Policy types
Visual editor
Evaluation flow
Step 1: Build the request context
Step 2: Collect all applicable policies
Step 3: Run the evaluation logic
Evaluation examples
Identity policies to allow access
Resource policy to deny access
Using conditions
Restricted resources
How to secure an AWS account
Security as an AWS administrator
Security as a developer
Conclusion
Glossary
About the author
Changelog
Copyright
Introduction
Preview
Structure of this book
Preview
Access control basics
Preview
Access elements
CloudTrail logging
IAM Policies
Structure
Policy types
Visual editor
Evaluation flow
Step 1: Build the request context
Step 2: Collect all applicable policies
Step 3: Run the evaluation logic
Evaluation examples
Identity policies to allow access
Resource policy to deny access
Using conditions
Restricted resources
How to secure an AWS account
Security as an AWS administrator
Security as a developer
Conclusion
Glossary
About the author
Changelog
Copyright
In this chapter
Access elements
Principal
IAM Users
IAM Roles
Special Principals
Resource
Action
Metadata
Access elements
Principal
IAM Users
IAM Roles
Special Principals
Resource
Action
Metadata
This chapter is not included in the preview
Sign in with your license key
or
Buy the book
Previous
< Access control basics
Next
CloudTrail logging >
Access elements
Principal
IAM Users
IAM Roles
Special Principals
Resource
Action
Metadata