All technological notes.
AWS IAM
AWS IAM Identity Center - SSOIAM Access Analyzer - Access outside, Zone of TrustAWS Directory Services - Microsoft AD, on-premiseAWS IAM Identity Center - SSOAWS STS (SecurityToken Service) - temporary, limited-privileges credentialsAmazon Cognito (simplified) - app user, dbNetwork-Centric: Old-Way
Identity-Centric: New-Way
Primary Security Perimeter
Zero Trust Model
In the Zero Trust Model, Identity becomes the primary security perimeter.
Identity-Centric does not replace but arguments network-centric security.
Identity Security Controls
Zero Trust.
AWS does not have a ready-to-use identity controls are intelligent, which is why AWS is considered to not have a true Zero Trust offering for customers, and third-party services need to be used.
A collection of AES services can be setup to intelligent-ish detection concerns but requires expert knowledge.
AWS does technically implement a Zero Trust Model but does not allow for intelligent identity security controls.
要实现智能, 需要使用第三方.

Identity Provider (IdP)
Federated identity
A trusted provider of user identity lets user use authenticate to access other services.
Identity Providers: Facebook, Amazon, Google, Twitter, Github, LinkedIn.
Protocol

Directory Service
A direcotry service is a critical component of a network operating system.
directory server (name server)

Active Directory - Windows

Single-Sign-On (SSO)
Exmaple: Active Directory

Lightweight Directory Access Protocol (LDAP)
SSO allows users to single ID and password, but they have to enter it in every time they want to login.

Multi-Factor Authenication (MFA)
MFA protects against people who have stolen user’s password.

Security Keys
A security key can resemble a memory stick which will generate an autofill a security token.

Principle of Least Privilege (PoLP)
Just-Enough-Access (JEA)
Just-In-Time (JIT)
Risk-based adaptive policies
AWS at the time of this recording does not have Risk-based adaptative policies built into IAM.
AWS IAMAWS Identity and Access Management (IAM)
IAM Policies
IAM Permission
IAM Identities
IAM Users
IAM Groups
IAM Roles
IAM Roles
总结:
IAM Policy

AWS Account
Root User
a special account with full access that cannot be deleted.

Root user privileges
Root user = Account Owner (created when the account is created)Do not use the root account for everyday tasks, even administrative tasks
User
| Root User | Regular User | |
|---|---|---|
| Login | Email + pwd | Account ID/Alias + PWD |
| Delete | Cannot be deleted | Can |
| Permissions | Full, cannot be limited | Can be denied |
| Number | One per AWS acount | Many |
| Task | Specialized tasks | Daily or common tasks |
| Access Keys | Never use | Recommended |
| MFA | Strongly recommended | Recommended |
AWS IAM Identity Center - SSOIAM Identity Center

Access Keys
AWS Credentials


IAM Credentials Report (account-level)
IAM Access Advisor (user-level)
IAM Access Analyzer - Access outside, Zone of TrustAWS
User
AWS Directory Services - Microsoft AD, on-premiseAWS Managed Microsoft AD
AD Connector
Simple AD
AWS IAM Identity Center - SSOAWS Single Sign-On)One login (single sign-on) for all your
AWS STS (SecurityToken Service) - temporary, limited-privileges credentialsSTS tokens to access AWS resourcesAmazon Cognito (simplified) - app user, dbAudit:
AWS CLI:
AWS SDK:
IAM
Organizations
Directory Services
IAM Identity Center
Security Token Service (STS)
Cognito