Chapter 6
Authentication and Authorization—AWS Identity and Access Management
THE AWS CERTIFIED SOLUTIONS ARCHITECT ASSOCIATE EXAM OBJECTIVES COVERED IN THIS CHAPTER MAY INCLUDE, BUT ARE NOT LIMITED TO, THE FOLLOWING:
- Domain 3: Specify Secure Applications and Architectures
- ✓ 3.1 Determine how to secure application tiers.
- ✓ 3.2 Determine how to secure data.
Introduction
Your AWS resources are probably your company’s crown jewels, so you definitely don’t want to leave them unprotected. But you also can’t lock them down so tightly that even your admins and customers can’t get in.
Finding the perfect balance is possible. Getting there will have a lot to do with the way you authenticate user requests to confirm they’re legitimate and then authorize no more and no less than the exact access they’ll need. On AWS, authentication and authorization are primarily handled by Identity and Access Management (IAM).
In this chapter...