Section 2: Security Responsibility and Access Management
Throughout this section, you will be introduced to one of the most fundamental principals of working with AWS Security: the AWS shared responsibility model. This will help you understand where your security responsibility, both as a customer and as part of AWS, starts and ends. You will then be introduced to a number of different AWS services that allow you to effectively manage and implement solid access control policies so that you can control who has access to which resources within your AWS account. You will also learn about the best practices regarding identity and access management (IAM), in addition to how to create and configure many of the available components.
To implement stringent access control, you will need a solid understanding of how access policies work. To ensure you have this in your tool belt, we'll dive into how to create them and the parameters that are used to define and control access. Finally, we'll look at how to manage access control at scale using federated access to create a single sign-on approach, in addition to how to manage access to AWS resources when using mobile applications.
By the end of this section, you will have a strong understanding of AWS access management and the different techniques and mechanisms that can be used to implement access security.
This section comprises the following chapters: