A Practical Guide to AWS IAM Sign in
A Practical Guide to AWS IAM
Sign in
  • Introduction Preview
    • Structure of this book Preview
  • Access control basics Preview
    • Access elements
    • CloudTrail logging
  • IAM Policies
    • Structure
    • Policy types
    • Visual editor
  • Evaluation flow
    • Step 1: Build the request context
    • Step 2: Collect all applicable policies
    • Step 3: Run the evaluation logic
  • Evaluation examples
    • Identity policies to allow access
    • Resource policy to deny access
    • Using conditions
    • Restricted resources
  • How to secure an AWS account
    • Security as an AWS administrator
    • Security as a developer
  • Conclusion
  • Glossary
  • About the author
  • Changelog
  • Copyright
  • Introduction Preview
    • Structure of this book Preview
  • Access control basics Preview
    • Access elements
    • CloudTrail logging
  • IAM Policies
    • Structure
    • Policy types
    • Visual editor
  • Evaluation flow
    • Step 1: Build the request context
    • Step 2: Collect all applicable policies
    • Step 3: Run the evaluation logic
  • Evaluation examples
    • Identity policies to allow access
    • Resource policy to deny access
    • Using conditions
    • Restricted resources
  • How to secure an AWS account
    • Security as an AWS administrator
    • Security as a developer
  • Conclusion
  • Glossary
  • About the author
  • Changelog
  • Copyright

Access elements Principal IAM Users IAM Roles Special Principals Resource Action Metadata

Access elements

Principal

IAM Users

IAM Roles

Special Principals

Resource

Action

Metadata

This chapter is not included in the preview
  • Sign in with your license key or
  • Buy the book
Previous
< Access control basics
Next
CloudTrail logging >
© Tamás Sallai - advancedweb.hu
Access elements Principal IAM Users IAM Roles Special Principals Resource Action Metadata