AWS Identity and Access Management (IAM)

From wikieduonline
Revision as of 06:12, 6 June 2024 by Welcome (talk | contribs) (Welcome moved page AWS Identity and Access Management to AWS Identity and Access Management (IAM))
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Amazon in 2012 introduces AWS Identity and Access Management (IAM) for EC2 [1]. In February introduced Managed Policies by AWS[2] and since November 2016 there are 10 different policies bases on job functions: AdministratorAccess (This policy grants full access to all AWS services, similar to root role in Unix systems), Billing, Data Scientist, Database Administrator, Developer Power User, Network Administrator, Security Auditor, Support User, System Administrator and View Only User [3][4]


Examples policies[edit]

News[edit]

Activities[edit]

Related terms[edit]

See also[edit]

  • https://en.wikiversity.org/wiki/Cloud_computing/Amazon_Web_Services/Identity_and_Access_Management
  • https://aws.amazon.com/blogs/aws/new-managed-policies-for-aws-identity-access-management/
  • https://aws.amazon.com/blogs/security/how-to-assign-permissions-using-new-aws-managed-policies-for-job-functions/
  • https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_job-functions.html
  • https://aws.amazon.com/es/blogs/security/easier-way-to-control-access-to-aws-regions-using-iam-policies/
  • Advertising: