Finra intern project

Get Started. It's Free
or sign up with your email address
Finra intern project by Mind Map: Finra intern project

1. Roles

1.1. Benefits

1.1.1. Untitled

1.2. Type

1.2.1. AWS service roles

1.2.2. Role for cross-account access

1.2.3. Role for identity provider access

1.3. Fundamentals

1.3.1. Delegation

1.3.2. Federation

1.3.3. Policy Permissions policy What actions and resources a user can use Trust policy Who can assume the role

1.3.4. Cross-account access

1.4. IAM users vs federated users

1.4.1. Untitled

1.5. use case examples

1.5.1. roles for cross-account access, delegation and federation

1.5.2. temporary credentials process an IAM user switch to a role temporarily use the permissions of the role in the console When users exit the role, their original permissions are restored don't need to share or maintain long-term security credentials for each entity that needs access to a resource

1.6. switching to a role

1.7. modify a role

1.8. temporary credentials

1.9. Def

1.9.1. Roles can be issumed by users, web services, or a federated user EC2

1.9.2. Sets of permissions

1.10. two ways to use

1.10.1. Interactively in the IAM console

1.10.2. programmatically with AWS CLI, API

1.11. AWS security token service

2. identity-based vs resource-based permissions

2.1. Untitled

3. best practices

3.1. Untitled

3.2. Use IAM roles to share access

3.2.1. Untitled

3.3. Use IAM roles for Amazon EC2 instances

3.3.1. Untitled

4. Policies

4.1. Policy structure

4.1.1. Statements Sample statements Untitled Structure Effect Actions Resources Conditions

4.1.2. policy elements Untitled

4.1.3. Sample policies Untitled

4.1.4. Policy evaluation process logical OR applied across multiple statements at evaluation time logical OR applied across multiple policies at evaluation time Untitled

4.2. Create policy

4.2.1. Copy an AWS managed policy

4.2.2. Policy generator

4.2.3. Create your own policy

4.3. Types

4.3.1. inline vs managed policies Untitled Untitled

4.3.2. groups and management policies Untitled Untitled

4.3.3. Managed policies Comparison Untitled Customer managed AWS managed commonly used job functions in the IT industry Granting permissions for these common job functions easy they are maintained and updated by AWS as new services and APIs are introduced Read-only Examples AdministratorAccess PowerUserAccess AWSCloudTrailReadOnlyAccess

4.4. Policy versioning

4.5. Policy simulator

5. Audit user account access

5.1. Benefits

5.1.1. Untitled

5.2. CloudTrail

5.2.1. information Untitled

5.2.2. use cases Untitled

5.2.3. Event examples Untitled

5.3. Access advisor

5.3.1. Untitled

5.4. Credential report

5.4.1. Untitled

5.5. AWS trusted advisor

5.6. AWS inspector

6. IAM groups

6.1. Benefits

6.2. Why group cannot be nested?

7. IAM users

7.1. Password policies

7.2. Access keys

7.3. Multi-factor authentication

7.4. Permissions

7.5. IAM users and groups best practices

7.5.1. Untitled

7.5.2. Untitled

8. team work

8.1. Splunk AWS

8.2. Splunk Dashboard

9. Challenging part

9.1. Finish within 3 months

9.2. Untitled

10. like most

10.1. Comprehensive documentation

11. importance

11.1. one AWS account vs multiple AWS account

11.1.1. Untitled

11.2. News services and APIs are introduced on a regular basis