Finra intern project

Iniziamo. È gratuito!
o registrati con il tuo indirizzo email
Finra intern project da Mind Map: Finra intern project

1. Audit user account access

1.1. Benefits

1.1.1. Untitled

1.2. CloudTrail

1.2.1. information

1.2.1.1. Untitled

1.2.2. use cases

1.2.2.1. Untitled

1.2.3. Event examples

1.2.3.1. Untitled

1.3. Access advisor

1.3.1. Untitled

1.4. Credential report

1.4.1. Untitled

1.5. AWS trusted advisor

1.6. AWS inspector

2. IAM groups

2.1. Benefits

2.2. Why group cannot be nested?

3. IAM users

3.1. Password policies

3.2. Access keys

3.3. Multi-factor authentication

3.4. Permissions

3.5. IAM users and groups best practices

3.5.1. Untitled

3.5.2. Untitled

4. team work

4.1. Splunk AWS

4.2. Splunk Dashboard

5. Challenging part

5.1. Finish within 3 months

5.2. Untitled

6. like most

6.1. Comprehensive documentation

7. importance

7.1. one AWS account vs multiple AWS account

7.1.1. Untitled

7.2. News services and APIs are introduced on a regular basis

8. Roles

8.1. Benefits

8.1.1. Untitled

8.2. Type

8.2.1. AWS service roles

8.2.2. Role for cross-account access

8.2.3. Role for identity provider access

8.3. Fundamentals

8.3.1. Delegation

8.3.2. Federation

8.3.3. Policy

8.3.3.1. Permissions policy

8.3.3.1.1. What actions and resources a user can use

8.3.3.2. Trust policy

8.3.3.2.1. Who can assume the role

8.3.4. Cross-account access

8.4. IAM users vs federated users

8.4.1. Untitled

8.5. use case examples

8.5.1. roles for cross-account access, delegation and federation

8.5.2. temporary credentials

8.5.2.1. process

8.5.2.1.1. an IAM user switch to a role temporarily use the permissions of the role in the console

8.5.2.1.2. When users exit the role, their original permissions are restored

8.5.2.2. don't need to share or maintain long-term security credentials for each entity that needs access to a resource

8.6. switching to a role

8.7. modify a role

8.8. temporary credentials

8.9. Def

8.9.1. Roles can be issumed by users, web services, or a federated user

8.9.1.1. EC2

8.9.2. Sets of permissions

8.10. two ways to use

8.10.1. Interactively in the IAM console

8.10.2. programmatically with AWS CLI, API

8.11. AWS security token service

9. identity-based vs resource-based permissions

9.1. Untitled

10. best practices

10.1. Untitled

10.2. Use IAM roles to share access

10.2.1. Untitled

10.3. Use IAM roles for Amazon EC2 instances

10.3.1. Untitled

11. Policies

11.1. Policy structure

11.1.1. Statements

11.1.1.1. Sample statements

11.1.1.1.1. Untitled

11.1.1.2. Structure

11.1.1.2.1. Effect

11.1.1.2.2. Actions

11.1.1.2.3. Resources

11.1.1.2.4. Conditions

11.1.2. policy elements

11.1.2.1. Untitled

11.1.3. Sample policies

11.1.3.1. Untitled

11.1.4. Policy evaluation process

11.1.4.1. logical OR applied across multiple statements at evaluation time

11.1.4.2. logical OR applied across multiple policies at evaluation time

11.1.4.3. Untitled

11.2. Create policy

11.2.1. Copy an AWS managed policy

11.2.2. Policy generator

11.2.3. Create your own policy

11.3. Types

11.3.1. inline vs managed policies

11.3.1.1. Untitled

11.3.1.2. Untitled

11.3.2. groups and management policies

11.3.2.1. Untitled

11.3.2.2. Untitled

11.3.3. Managed policies

11.3.3.1. Comparison

11.3.3.1.1. Untitled

11.3.3.2. Customer managed

11.3.3.3. AWS managed

11.3.3.3.1. commonly used job functions in the IT industry

11.3.3.3.2. Granting permissions for these common job functions easy

11.3.3.3.3. they are maintained and updated by AWS as new services and APIs are introduced

11.3.3.3.4. Read-only

11.3.3.4. Examples

11.3.3.4.1. AdministratorAccess

11.3.3.4.2. PowerUserAccess

11.3.3.4.3. AWSCloudTrailReadOnlyAccess

11.4. Policy versioning

11.5. Policy simulator