SlideShare une entreprise Scribd logo
1  sur  52
AWS Meister Series Reloaded
~IAM & Consolidated Billing~

                 Jan. 30th 2012
                 Akio Katayama( @c9katayama )
                 Solutions Architect in Japan SA Team
                 - Translated by Kenta Yasukawa -
Web Seminar
AWS Meister Series Reloaded
   Up-to-date materials from the Meister Series in Japanese
   New contents and New speakers!
   New services will be introduced!




Join at (Japanese) :
   http://aws.amazon.com/jp/event_schedule/
Agenda

 IAM Overview
 IAM Operations & Configuration
 Identity Federation
 Consolidated Billing Overview
 How to use Consolidated Billing
 Closing Remarks




                Copyright © 2011 Amazon Web Services
IAM Overview
IAM(AWS Identity and Access
Management)
 For AWS User Authentication and Access Policy
  Management
    Creating users and groups for different AWS operations
    Applying access policies such as “allowing to launch EC2
     instances” and “allowing to write to an S3 bucket”
  User/Group management
    Each user is authenticated and applied a different access
     policy
    Each group may have a different access policy
    Each group may have multiple users
      • Users in a group inherit the access policy of the group

                                  Developers    O&M
IAM(AWS Identity and Access
Management)
 Various authentication token issued for each user
   Access key and Secret key
      For authentication upon use of SDKs
   Security Certificate (X.509)
      For authentication upon operations such as AMI-tools
   Login password for AWS management console
   Multi-Factor Authentication (MFA) device
      For providing additional level of security for
       management console
       Developers      AWS            O&M
How IAM Works                     Authorizes every request from API
                                    and Management Console



All           Administrator group
operations
granted




All S3
              Developer group
operations
granted




S3 Read-
only access   O&M group
granted
Use Cases

 Improving Security
   IAM User can be easily invalidated
 Backup-only User
   Taking Snapshots with a user with only EBS snapshot
    permission granted
   Wrong operations cannot stop EC2 instances
 Assigning different S3 buckets to users
   Partitioned access for S3 for an account
 Business Management User
   Creating IAM User(s) who can only access billing
    information
IAM Operations and
   Configuration
Operations and Configuration

 Two Ways for Managing Users and Groups
   AWS Management Console
   IAM API


 ”Access Policy Language” for describing policies
   JSON format
Management Console



                     Select “IAM”



   User/Group
   management
Access Policy Language
{
    "Statement": [
      {
        "Effect": "Allow",
        "Action": [
           " s3:ListBuckets ",
           " s3:Get * "
        ],
        "Resource": [
           "*"
        ],
        "Condition": {
           "StringEquals": {
             "aws:SourceIP": [“176.32.92.49/32“]
           }
        }
      }
    ]
}
Access Policy Language
{
    "Statement": [
      {
        "Effect": "Allow",
        "Action": [
           " s3:ListBuckets ",
           " s3:Get * "
        ],
        "Resource": [
           "*"                                     Access is granted or rejected
        ],                                          according to the statement
        "Condition": {
           "StringEquals": {
             "aws:SourceIP": [“176.32.92.49/32“]
           }
        }
      }
    ]
}
Access Policy Configuration
  {
                                          “Allow” for granting access
    "Effect": "Allow",
                                          “Deny” for rejecting
    "Action": [
       " s3:ListBuckets ",                Specifies target operations
       " s3:Get * "                       * Wildcard is allowed
    ],
    "Resource": [                         Specifies target resources with
       "*"                                Amazon Resource Name (ARN)
    ],                                    * Wildcard is allowed
    "Condition": {
       "StringEquals": {
         "aws:SourceIP":                    Specifies condition to enable this
           [“176.32.92.49/32“]              policy
       }
    }
  }               This example means
                  “If the request is from 176.32.92.49, S3 ListBuckets
                  and Get related oprations would be allowed”
Action & Resource

 “Action” specifies right for operations, e.g.
     RunInstances
     AttachVolume
     CreateBucket
     DeleteObject
 “Resource” specifies right for targets of operations,
 e.g.
     EC2 Instances
     EBS Volumes
     S3 Buckets
     S3 Objects
Support for Action/Resource
 AWS Services               Action   Resource
 IAM
 Amazon CloudFront
 Amazon CloudWatch                              EC2 does not support
 Amazon EC2                                     Resource and thus
 Amazon ElastiCache                             controlling access to
 Amazon Elastic MapReduce                       each EC2 instance
 Amazon RDS
                                                and/or EBS volume is
 Amazon Route 53
                                                not supported
 Amazon S3
 Amazon SES
 Amazon SimpleDB
 Amazon SNS
 Amazon SQS
 Amazon VPC
 Auto Scaling
 AWS CloudFormation
 AWS Elastic Beanstalk
 Elastic Load Balancing
 DynamoDB
Available Condition Statements

 Text String
   StringEquals,StringNotEquals, StringEqualsIgnoreCase
   StringNotEqualsIgnoreCase,StringLike,StringNotLike
 Number
 Date
 Boolean
 IP Address
   IpAddress
   NotIpAddress
Condition Statement

   "Condition" : {
      "DateGreaterThan" : {
         "aws:CurrentTime" : "2009-04-16T12:00:00Z"
 AND
       },
      "DateLessThan": {
         "aws:CurrentTime" : "2009-04-16T15:00:00Z"
       },
 AND   "IpAddress" : {
          "aws:SourceIp" : ["192.168.176.0/24","192.168.143.0/24"]
      }
   }                                         OR
Policy Configuration on Management Console




                                 Choosing from
                                   templates




                               Creating with Policy
                                   Generator
                               Manual editing for
                                   policies
Policy Generator
Logic for Granting or Rejecting Access
 Multiple Conditions are Allowed for a Policy
   Each user or group may have different conditions
   Contradicting conditions may be configured
 All access is denied by default (Default to Deny)
   Access is granted only if an “Allow” condition matches
   If a “Deny” condition matches, access is denied
    (Explicit Denial)
   Default to Deny < Allow < Explicit Denial
     Group’s Statement           Group’s Statement
                                    Deny
        Allow                             Allow
                                    (Explicit Denial

     User’s Statement            User’s Statement
        No matching
        (Default to Deny)
                                     Allow

         Decides to Allow             Decides to Deny
User based and Resource based
 Besides Users and Groups, Policies can be Assigned to
 Resources
 E.g. S3 Buckets and SQS queues can be applied
 policies
   Configuring a bucket to be only accessible from a certain
    IP address(es)




        User based
                                   Resource based
Cross-Account Access

 Granting Access from an AWS account to Another

             1. Configure the following policy to Account A’s bucket
              {
                  "Statement" : {
                    "Effect":"Allow",
                    "Principal" : {
                       "AWS":“<AWS Account B’s account number>"
                    },
                    "Action":"s3:*",
                    "Resource":"arn:aws:s3:::mybucket/*"
                  }
              }


             2. Create User1 in Account B and grant access to
             “mybucket”
               User1 will be granted to access mybucket
             3. Unless explicitly allowed, User2 cannot access mybucket
Use of Management Console with IAM User
 Use Dedicated URL for IAM users that belong to an
 AWS account
 Friendly name can be configured with “Account Alias”
   First come, First served –basis as same as S3 buckets


                                      Created Account Alias




     Dedicated URL
Limitations

 Each AWS Account can have
     Up to 100 Groups
     Up to 5000 Users
     1 User can belong up to 10 groups
     Contact AWS support team to increase the limits
Identity Federation
Identity Federation
 Feature to link the authentication system in a
 company/organization and AWS authentication
 E.g. Granting access to S3 for users authenticated
 with LDAP
 Users authenticated with the federated authentication
 (Federated Users) are issued Temporary Security
 Credentials for AWS
Temporary Security Credentials
     Temporal authentication information for AWS
       A set of Time-limited Authentication Token
     Each Federated User gets:
       Access Key
       Secret Key
       Session Token
     Expiration Timer for issued credential is configurable
       12 hours by default
       From Minimum 1 hour to Maximum 36 hours
       No way to extend or shorten the timer once issued




8
Metaphor with Hotel…




  AWS Account’s   IAM User   Temporary Security
  Access Key ID                 Credentials
IAM Permission Hierarchy
                 Permissions            Example
                 All operations         Action: *
                                        Effect: Allow
                 possible               Resource: *
  AWS Account
                                        (implicit)



                 Permissions granted    Action: [‘s3:*’,
                                        ‘sts:Get*’]
                 for User/Group         Effect: Allow
   IAM User
                                        Resource: *



                 Determined when the    Action: [ ‘s3:Get*’ ]
   Temporary                            Effect: Allow
                 credential is issued   Resource:
    Security
   Credentials                          ‘arn:aws:s3:::mybucket/*’
Use Cases
 Mobile Applications
   Issuing Temporary Security Credential for each
    authenticated mobile application user
   The user can upload files directly to S3
   Secure because the credential has expiration date
 Temporal Access Permissions
   Creating applications which can upload files to S3 for a
    limited period
   Applications which can launch EC2 instances for a limited
    period
 Different Access Policies for users in an organization
   Creating S3 bucket for each user
   Giving different rights to different groups
How Identity Federation Works
 Use in Web Applications
             Company/Organization




                                    Temporary Credential
                                    Issuing Service
How Identity Federation Works
 Use in Mobile and Client Applications




                 Company/Organization




                                         Temporary Credential
                                         Issuing Service
How to Use Identity Federation Federation Token
                               Get
                                                                   from application by
 final String userId = request.getParameter("userId");
 final String password = request.getParameter("password");
                                                                       using API
 // Performs certain authentication in organization specific way
 executeLDAPAuthentication(userId,password);

 AWSCredentials credentials = new BasicAWSCredentials(IAM User ID, Password);
 // SecurityToken Client
 AWSSecurityTokenService securityTokenService =
        new AWSSecurityTokenServiceClient(masterCredentials);

 GetFederationTokenRequest req = new GetFederationTokenRequest();
 req.setName(userId);
 // Setting S3 Read only policy
 req.setPolicy(“{”Statement“: [{”Effect“: ”Allow“,”Action“:
                                           ["s3:Get*","s3:List*"],"Resource":
 "*"}]}");
 // Getting Temporary Security Credentials
 GetFederationTokenResult result = securityTokenService.getFederationToken(req);
 Credentials cs = result.getCredentials();
 String tempAccessId = cs.getAccessKeyId();
 String tempSecretkey = cs.getSecretAccessKey();
 String sessionToken = cs.getSessionToken();



16
Limitations
 Support for Temporary Users   (As of Jan. 2012)

   CloudFront            S3
   CloudWatch            SimpleDB
   DynamoDB(API Only)    SQS
   EC2                   SNS
   ElastiCache           ELB
   RDS                   Route53
Logon to Management Console

 Dedicated URL for Temporary Users
   https://signin.aws.amazon.com/federation
 Steps for Logon
   Access to:
     • /federation?Action=getSigninToken&SessionType=js
       on&Session={“sessionId”:””, ”sessionKey”:””,
       “sessionToken”:””}
   Token for logon is returned in response to the above
    request
   Redirected to:
     • /federation?Action=login&SigninToken=<Token>&De
       stination=<Management Console URL>
How Identity Federation Works

              Company/Organization

                                     Temporary Credential
                                     Issuing Service




                                         Encrypts Token
Consolidated Billing
Consolidated Billing

 AWS bills for multiple accounts can be consolidated
 Single payment for multiple accounts


                                     All AWS fees are
     Billing Account                  charged to this
                                          account


          Sub Account

          Sub Account
Benefits
 Centralized Billing Management
 Possible to check each account’s usage breakdown,
 e.g.
   Each section
   Each project
 Amount for Traffic and Stored Data used by all
 accounts is aggregated
   Volume discount is applied for the aggregated amount
 Reserved Instance (RI) is flexibly applied
   E.g. If a RI purchased by an account is not used, the
    discount would be automatically applied to another
    account
Process to Apply

    Decide the billing
        account

                            Approve at sub-accounts
                              by checking Emails
  Create sub-accounts
  (And/or use existing
       accounts)


    Notify sub accounts
 from the billing account        Consolidation
  (Send Email from the            Established
   dedicated web page)
Process to Apply
Logon with the billing account and choose “Consolidated
Billing”
Process to Apply
Send a request to each sub account
Process to Apply
Send a request to each sub account




                             Email address of the
                                sub account
Process to Apply
Sub account receives an Email from AWS
Process to Apply
Approve the request at Sub account
Process to Apply
Consolidated Billing Established
After Consolidation
Billing account gets additional field for sub accounts
Closing Remarks
Closing Remarks

 IAM enables detailed access policy control for AWS
 operations
 Improved Security by creating different users and
 giving different policies
 Identity Federation with authentication systems in a
 company or organization
 Consolidated Billing enables
   Centralized Billing Management
   Checking breakdown for different accounts
   More chances for volume discount
Q&A




Copyright © 2011 Amazon Web Services
Thank You For Joining




      Copyright © 2011 Amazon Web Services

Contenu connexe

Tendances

Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Amazon Web Services
 
Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017
Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017
Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017Amazon Web Services
 
Aws iam best practices to live by
Aws iam best practices to live byAws iam best practices to live by
Aws iam best practices to live byJohn Varghese
 
AWS Twin Cities Meetup - IAM Deep Dive
AWS Twin Cities Meetup - IAM Deep DiveAWS Twin Cities Meetup - IAM Deep Dive
AWS Twin Cities Meetup - IAM Deep DiveAdam Fokken
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAMKnoldus Inc.
 
How to use IAM roles grant access to AWS
How to use IAM roles grant access to AWSHow to use IAM roles grant access to AWS
How to use IAM roles grant access to AWSAmazon Web Services
 
SEC302 Delegating Access to Your AWS Environment - AWS re: Invent 2012
SEC302 Delegating Access to Your AWS Environment - AWS re: Invent 2012SEC302 Delegating Access to Your AWS Environment - AWS re: Invent 2012
SEC302 Delegating Access to Your AWS Environment - AWS re: Invent 2012Amazon Web Services
 
IAM Deep Dive - Custom IAM Policies with Conditions
IAM Deep Dive - Custom IAM Policies with ConditionsIAM Deep Dive - Custom IAM Policies with Conditions
IAM Deep Dive - Custom IAM Policies with ConditionsBryant Poush
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
Mastering Access Control Policies
Mastering Access Control PoliciesMastering Access Control Policies
Mastering Access Control PoliciesAmazon Web Services
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveJason Chan
 
AWS Enterprise Summit Netherlands - Creating a Landing Zone
AWS Enterprise Summit Netherlands - Creating a Landing ZoneAWS Enterprise Summit Netherlands - Creating a Landing Zone
AWS Enterprise Summit Netherlands - Creating a Landing ZoneAmazon Web Services
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAmazon Web Services
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudAmazon Web Services
 
(SEC303) Mastering Access Control Policies | AWS re:Invent 2014
(SEC303) Mastering Access Control Policies | AWS re:Invent 2014(SEC303) Mastering Access Control Policies | AWS re:Invent 2014
(SEC303) Mastering Access Control Policies | AWS re:Invent 2014Amazon Web Services
 

Tendances (20)

Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 
Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017
Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017
Becoming an AWS Policy Ninja using AWS IAM - AWS Summit Tel Aviv 2017
 
Aws iam best practices to live by
Aws iam best practices to live byAws iam best practices to live by
Aws iam best practices to live by
 
AWS Twin Cities Meetup - IAM Deep Dive
AWS Twin Cities Meetup - IAM Deep DiveAWS Twin Cities Meetup - IAM Deep Dive
AWS Twin Cities Meetup - IAM Deep Dive
 
Federation
FederationFederation
Federation
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAM
 
How to use IAM roles grant access to AWS
How to use IAM roles grant access to AWSHow to use IAM roles grant access to AWS
How to use IAM roles grant access to AWS
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
Federation
Federation Federation
Federation
 
SEC302 Delegating Access to Your AWS Environment - AWS re: Invent 2012
SEC302 Delegating Access to Your AWS Environment - AWS re: Invent 2012SEC302 Delegating Access to Your AWS Environment - AWS re: Invent 2012
SEC302 Delegating Access to Your AWS Environment - AWS re: Invent 2012
 
A guide on Aws Security Token Service
A guide on Aws Security Token ServiceA guide on Aws Security Token Service
A guide on Aws Security Token Service
 
IAM Deep Dive - Custom IAM Policies with Conditions
IAM Deep Dive - Custom IAM Policies with ConditionsIAM Deep Dive - Custom IAM Policies with Conditions
IAM Deep Dive - Custom IAM Policies with Conditions
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Mastering Access Control Policies
Mastering Access Control PoliciesMastering Access Control Policies
Mastering Access Control Policies
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's Perspective
 
AWS Enterprise Summit Netherlands - Creating a Landing Zone
AWS Enterprise Summit Netherlands - Creating a Landing ZoneAWS Enterprise Summit Netherlands - Creating a Landing Zone
AWS Enterprise Summit Netherlands - Creating a Landing Zone
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless Cloud
 
(SEC303) Mastering Access Control Policies | AWS re:Invent 2014
(SEC303) Mastering Access Control Policies | AWS re:Invent 2014(SEC303) Mastering Access Control Policies | AWS re:Invent 2014
(SEC303) Mastering Access Control Policies | AWS re:Invent 2014
 
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction
 

En vedette

Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Amazon Web Services
 
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)Amazon Web Services
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWSIan Massingham
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web ServicesAmazon Web Services
 
Journey through Cloud front AWS
Journey through Cloud front AWSJourney through Cloud front AWS
Journey through Cloud front AWSMd. Khairul Anam
 
Artem Zhurbila 4 aws - s3, glacier, cloud front, rds
Artem Zhurbila 4 aws - s3, glacier, cloud front, rdsArtem Zhurbila 4 aws - s3, glacier, cloud front, rds
Artem Zhurbila 4 aws - s3, glacier, cloud front, rdsArtem Zhurbila
 
Running SAP All-in-One ERP production system deployment on the AWS cloud
Running SAP All-in-One ERP production system deployment on the AWS cloudRunning SAP All-in-One ERP production system deployment on the AWS cloud
Running SAP All-in-One ERP production system deployment on the AWS cloudAmazon Web Services
 
Slide kinh nghiệm vận hành Cloud trên Amazon - Huỳnh Kỳ Anh
Slide kinh nghiệm vận hành Cloud trên Amazon - Huỳnh Kỳ AnhSlide kinh nghiệm vận hành Cloud trên Amazon - Huỳnh Kỳ Anh
Slide kinh nghiệm vận hành Cloud trên Amazon - Huỳnh Kỳ AnhLuong Trung Thanh
 
Connect2016 Shipping Domino
Connect2016 Shipping DominoConnect2016 Shipping Domino
Connect2016 Shipping DominoFactor-y S.r.l.
 
俺が考えた最強のID連携デザインパターン
俺が考えた最強のID連携デザインパターン俺が考えた最強のID連携デザインパターン
俺が考えた最強のID連携デザインパターンMasaru Kurahayashi
 
(SEC304) Bring Your Own Identities – Federating Access to Your AWS Environmen...
(SEC304) Bring Your Own Identities – Federating Access to Your AWS Environmen...(SEC304) Bring Your Own Identities – Federating Access to Your AWS Environmen...
(SEC304) Bring Your Own Identities – Federating Access to Your AWS Environmen...Amazon Web Services
 
[2주차] 알파유저를 위한 AWS 스터디
[2주차] 알파유저를 위한 AWS 스터디[2주차] 알파유저를 위한 AWS 스터디
[2주차] 알파유저를 위한 AWS 스터디Amazon Web Services Korea
 
amazon-cognito-auth-in-minutes
amazon-cognito-auth-in-minutesamazon-cognito-auth-in-minutes
amazon-cognito-auth-in-minutesVladimir Budilov
 
Accenture hf s-blueprint-report-telecom-operations-as-a-service-excerpt
Accenture hf s-blueprint-report-telecom-operations-as-a-service-excerptAccenture hf s-blueprint-report-telecom-operations-as-a-service-excerpt
Accenture hf s-blueprint-report-telecom-operations-as-a-service-excerptSilas Musakali
 
(SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
(SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014(SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
(SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014Amazon Web Services
 
Cloud Front & Serving Media From the Edge - AWS India Summit 2012
Cloud Front & Serving Media From the Edge - AWS India Summit 2012Cloud Front & Serving Media From the Edge - AWS India Summit 2012
Cloud Front & Serving Media From the Edge - AWS India Summit 2012Amazon Web Services
 
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...Amazon Web Services
 
(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation OptionsAmazon Web Services
 

En vedette (19)

Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
Top 10 AWS Identity and Access Management (IAM) Best Practices (SEC301) | AWS...
 
AWS Account Best Practices
AWS Account Best PracticesAWS Account Best Practices
AWS Account Best Practices
 
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
 
Journey through Cloud front AWS
Journey through Cloud front AWSJourney through Cloud front AWS
Journey through Cloud front AWS
 
Artem Zhurbila 4 aws - s3, glacier, cloud front, rds
Artem Zhurbila 4 aws - s3, glacier, cloud front, rdsArtem Zhurbila 4 aws - s3, glacier, cloud front, rds
Artem Zhurbila 4 aws - s3, glacier, cloud front, rds
 
Running SAP All-in-One ERP production system deployment on the AWS cloud
Running SAP All-in-One ERP production system deployment on the AWS cloudRunning SAP All-in-One ERP production system deployment on the AWS cloud
Running SAP All-in-One ERP production system deployment on the AWS cloud
 
Slide kinh nghiệm vận hành Cloud trên Amazon - Huỳnh Kỳ Anh
Slide kinh nghiệm vận hành Cloud trên Amazon - Huỳnh Kỳ AnhSlide kinh nghiệm vận hành Cloud trên Amazon - Huỳnh Kỳ Anh
Slide kinh nghiệm vận hành Cloud trên Amazon - Huỳnh Kỳ Anh
 
Connect2016 Shipping Domino
Connect2016 Shipping DominoConnect2016 Shipping Domino
Connect2016 Shipping Domino
 
俺が考えた最強のID連携デザインパターン
俺が考えた最強のID連携デザインパターン俺が考えた最強のID連携デザインパターン
俺が考えた最強のID連携デザインパターン
 
(SEC304) Bring Your Own Identities – Federating Access to Your AWS Environmen...
(SEC304) Bring Your Own Identities – Federating Access to Your AWS Environmen...(SEC304) Bring Your Own Identities – Federating Access to Your AWS Environmen...
(SEC304) Bring Your Own Identities – Federating Access to Your AWS Environmen...
 
[2주차] 알파유저를 위한 AWS 스터디
[2주차] 알파유저를 위한 AWS 스터디[2주차] 알파유저를 위한 AWS 스터디
[2주차] 알파유저를 위한 AWS 스터디
 
amazon-cognito-auth-in-minutes
amazon-cognito-auth-in-minutesamazon-cognito-auth-in-minutes
amazon-cognito-auth-in-minutes
 
Accenture hf s-blueprint-report-telecom-operations-as-a-service-excerpt
Accenture hf s-blueprint-report-telecom-operations-as-a-service-excerptAccenture hf s-blueprint-report-telecom-operations-as-a-service-excerpt
Accenture hf s-blueprint-report-telecom-operations-as-a-service-excerpt
 
(SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
(SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014(SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
(SEC302) Delegating Access to Your AWS Environment | AWS re:Invent 2014
 
Cloud Front & Serving Media From the Edge - AWS India Summit 2012
Cloud Front & Serving Media From the Edge - AWS India Summit 2012Cloud Front & Serving Media From the Edge - AWS India Summit 2012
Cloud Front & Serving Media From the Edge - AWS India Summit 2012
 
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
 
(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options
 

Similaire à AWS Identity and Access Management and Consolidated Billing

Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013Amazon Web Services
 
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on aws
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on awsAWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on aws
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on awsAWS Riyadh User Group
 
AWSome Day 2016 - Module 3: Security, Identity, and Access Management
AWSome Day 2016 - Module 3: Security, Identity, and Access ManagementAWSome Day 2016 - Module 3: Security, Identity, and Access Management
AWSome Day 2016 - Module 3: Security, Identity, and Access ManagementAmazon Web Services
 
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...Amazon Web Services
 
Diving into Common AWS Misconfigurations
Diving into Common AWS MisconfigurationsDiving into Common AWS Misconfigurations
Diving into Common AWS MisconfigurationsNikhil Sahoo
 
best aws training in bangalore
best aws training in bangalorebest aws training in bangalore
best aws training in bangalorerajkamal560066
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJean-François LOMBARDO
 
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS Organizations
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS OrganizationsSEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS Organizations
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS OrganizationsAmazon Web Services
 
Security Day IAM Recommended Practices
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended PracticesAmazon Web Services
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarAmazon Web Services
 
Amazon Web Services Security
Amazon Web Services SecurityAmazon Web Services Security
Amazon Web Services SecurityJason Chan
 
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...Amazon Web Services
 
Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...
Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...
Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...Amazon Web Services
 
Aws ebs snapshot with iam cross account access
Aws ebs snapshot with iam cross account accessAws ebs snapshot with iam cross account access
Aws ebs snapshot with iam cross account accessNaoya Hashimoto
 

Similaire à AWS Identity and Access Management and Consolidated Billing (20)

Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
 
Policy Ninja
Policy NinjaPolicy Ninja
Policy Ninja
 
Masting Access Control Policies
Masting Access Control PoliciesMasting Access Control Policies
Masting Access Control Policies
 
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on aws
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on awsAWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on aws
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on aws
 
AWSome Day 2016 - Module 3: Security, Identity, and Access Management
AWSome Day 2016 - Module 3: Security, Identity, and Access ManagementAWSome Day 2016 - Module 3: Security, Identity, and Access Management
AWSome Day 2016 - Module 3: Security, Identity, and Access Management
 
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
AWS re:Invent 2016: Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC...
 
Diving into Common AWS Misconfigurations
Diving into Common AWS MisconfigurationsDiving into Common AWS Misconfigurations
Diving into Common AWS Misconfigurations
 
best aws training in bangalore
best aws training in bangalorebest aws training in bangalore
best aws training in bangalore
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
 
Become an IAM Policy Ninja
Become an IAM Policy NinjaBecome an IAM Policy Ninja
Become an IAM Policy Ninja
 
Becoming an IAM Policy Ninja
Becoming an IAM Policy NinjaBecoming an IAM Policy Ninja
Becoming an IAM Policy Ninja
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS Organizations
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS OrganizationsSEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS Organizations
SEC302 Becoming an AWS Policy Ninja using AWS IAM and AWS Organizations
 
Security Day IAM Recommended Practices
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended Practices
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar
 
Amazon Web Services Security
Amazon Web Services SecurityAmazon Web Services Security
Amazon Web Services Security
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
 
Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...
Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...
Data Security in the Cloud Demystified – Policies, Protection, and Tools for ...
 
Aws ebs snapshot with iam cross account access
Aws ebs snapshot with iam cross account accessAws ebs snapshot with iam cross account access
Aws ebs snapshot with iam cross account access
 

Plus de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

AWS Identity and Access Management and Consolidated Billing

  • 1. AWS Meister Series Reloaded ~IAM & Consolidated Billing~ Jan. 30th 2012 Akio Katayama( @c9katayama ) Solutions Architect in Japan SA Team - Translated by Kenta Yasukawa -
  • 2. Web Seminar AWS Meister Series Reloaded  Up-to-date materials from the Meister Series in Japanese  New contents and New speakers!  New services will be introduced! Join at (Japanese) : http://aws.amazon.com/jp/event_schedule/
  • 3. Agenda IAM Overview IAM Operations & Configuration Identity Federation Consolidated Billing Overview How to use Consolidated Billing Closing Remarks Copyright © 2011 Amazon Web Services
  • 5. IAM(AWS Identity and Access Management) For AWS User Authentication and Access Policy Management  Creating users and groups for different AWS operations  Applying access policies such as “allowing to launch EC2 instances” and “allowing to write to an S3 bucket” User/Group management  Each user is authenticated and applied a different access policy  Each group may have a different access policy  Each group may have multiple users • Users in a group inherit the access policy of the group Developers O&M
  • 6. IAM(AWS Identity and Access Management) Various authentication token issued for each user  Access key and Secret key  For authentication upon use of SDKs  Security Certificate (X.509)  For authentication upon operations such as AMI-tools  Login password for AWS management console  Multi-Factor Authentication (MFA) device  For providing additional level of security for management console Developers AWS O&M
  • 7. How IAM Works Authorizes every request from API and Management Console All Administrator group operations granted All S3 Developer group operations granted S3 Read- only access O&M group granted
  • 8. Use Cases Improving Security  IAM User can be easily invalidated Backup-only User  Taking Snapshots with a user with only EBS snapshot permission granted  Wrong operations cannot stop EC2 instances Assigning different S3 buckets to users  Partitioned access for S3 for an account Business Management User  Creating IAM User(s) who can only access billing information
  • 9. IAM Operations and Configuration
  • 10. Operations and Configuration Two Ways for Managing Users and Groups  AWS Management Console  IAM API ”Access Policy Language” for describing policies  JSON format
  • 11. Management Console Select “IAM” User/Group management
  • 12. Access Policy Language { "Statement": [ { "Effect": "Allow", "Action": [ " s3:ListBuckets ", " s3:Get * " ], "Resource": [ "*" ], "Condition": { "StringEquals": { "aws:SourceIP": [“176.32.92.49/32“] } } } ] }
  • 13. Access Policy Language { "Statement": [ { "Effect": "Allow", "Action": [ " s3:ListBuckets ", " s3:Get * " ], "Resource": [ "*" Access is granted or rejected ], according to the statement "Condition": { "StringEquals": { "aws:SourceIP": [“176.32.92.49/32“] } } } ] }
  • 14. Access Policy Configuration { “Allow” for granting access "Effect": "Allow", “Deny” for rejecting "Action": [ " s3:ListBuckets ", Specifies target operations " s3:Get * " * Wildcard is allowed ], "Resource": [ Specifies target resources with "*" Amazon Resource Name (ARN) ], * Wildcard is allowed "Condition": { "StringEquals": { "aws:SourceIP": Specifies condition to enable this [“176.32.92.49/32“] policy } } } This example means “If the request is from 176.32.92.49, S3 ListBuckets and Get related oprations would be allowed”
  • 15. Action & Resource “Action” specifies right for operations, e.g.  RunInstances  AttachVolume  CreateBucket  DeleteObject “Resource” specifies right for targets of operations, e.g.  EC2 Instances  EBS Volumes  S3 Buckets  S3 Objects
  • 16. Support for Action/Resource AWS Services Action Resource IAM Amazon CloudFront Amazon CloudWatch EC2 does not support Amazon EC2 Resource and thus Amazon ElastiCache controlling access to Amazon Elastic MapReduce each EC2 instance Amazon RDS and/or EBS volume is Amazon Route 53 not supported Amazon S3 Amazon SES Amazon SimpleDB Amazon SNS Amazon SQS Amazon VPC Auto Scaling AWS CloudFormation AWS Elastic Beanstalk Elastic Load Balancing DynamoDB
  • 17. Available Condition Statements Text String  StringEquals,StringNotEquals, StringEqualsIgnoreCase  StringNotEqualsIgnoreCase,StringLike,StringNotLike Number Date Boolean IP Address  IpAddress  NotIpAddress
  • 18. Condition Statement "Condition" : { "DateGreaterThan" : { "aws:CurrentTime" : "2009-04-16T12:00:00Z" AND }, "DateLessThan": { "aws:CurrentTime" : "2009-04-16T15:00:00Z" }, AND "IpAddress" : { "aws:SourceIp" : ["192.168.176.0/24","192.168.143.0/24"] } } OR
  • 19. Policy Configuration on Management Console Choosing from templates Creating with Policy Generator Manual editing for policies
  • 21. Logic for Granting or Rejecting Access Multiple Conditions are Allowed for a Policy  Each user or group may have different conditions  Contradicting conditions may be configured All access is denied by default (Default to Deny)  Access is granted only if an “Allow” condition matches  If a “Deny” condition matches, access is denied (Explicit Denial)  Default to Deny < Allow < Explicit Denial Group’s Statement Group’s Statement Deny Allow Allow (Explicit Denial User’s Statement User’s Statement No matching (Default to Deny) Allow Decides to Allow Decides to Deny
  • 22. User based and Resource based Besides Users and Groups, Policies can be Assigned to Resources E.g. S3 Buckets and SQS queues can be applied policies  Configuring a bucket to be only accessible from a certain IP address(es) User based Resource based
  • 23. Cross-Account Access Granting Access from an AWS account to Another 1. Configure the following policy to Account A’s bucket { "Statement" : { "Effect":"Allow", "Principal" : { "AWS":“<AWS Account B’s account number>" }, "Action":"s3:*", "Resource":"arn:aws:s3:::mybucket/*" } } 2. Create User1 in Account B and grant access to “mybucket”  User1 will be granted to access mybucket 3. Unless explicitly allowed, User2 cannot access mybucket
  • 24. Use of Management Console with IAM User Use Dedicated URL for IAM users that belong to an AWS account Friendly name can be configured with “Account Alias”  First come, First served –basis as same as S3 buckets Created Account Alias Dedicated URL
  • 25. Limitations Each AWS Account can have  Up to 100 Groups  Up to 5000 Users  1 User can belong up to 10 groups  Contact AWS support team to increase the limits
  • 27. Identity Federation Feature to link the authentication system in a company/organization and AWS authentication E.g. Granting access to S3 for users authenticated with LDAP Users authenticated with the federated authentication (Federated Users) are issued Temporary Security Credentials for AWS
  • 28. Temporary Security Credentials Temporal authentication information for AWS  A set of Time-limited Authentication Token Each Federated User gets:  Access Key  Secret Key  Session Token Expiration Timer for issued credential is configurable  12 hours by default  From Minimum 1 hour to Maximum 36 hours  No way to extend or shorten the timer once issued 8
  • 29. Metaphor with Hotel… AWS Account’s IAM User Temporary Security Access Key ID Credentials
  • 30. IAM Permission Hierarchy Permissions Example All operations Action: * Effect: Allow possible Resource: * AWS Account (implicit) Permissions granted Action: [‘s3:*’, ‘sts:Get*’] for User/Group Effect: Allow IAM User Resource: * Determined when the Action: [ ‘s3:Get*’ ] Temporary Effect: Allow credential is issued Resource: Security Credentials ‘arn:aws:s3:::mybucket/*’
  • 31. Use Cases Mobile Applications  Issuing Temporary Security Credential for each authenticated mobile application user  The user can upload files directly to S3  Secure because the credential has expiration date Temporal Access Permissions  Creating applications which can upload files to S3 for a limited period  Applications which can launch EC2 instances for a limited period Different Access Policies for users in an organization  Creating S3 bucket for each user  Giving different rights to different groups
  • 32. How Identity Federation Works Use in Web Applications Company/Organization Temporary Credential Issuing Service
  • 33. How Identity Federation Works Use in Mobile and Client Applications Company/Organization Temporary Credential Issuing Service
  • 34. How to Use Identity Federation Federation Token Get from application by final String userId = request.getParameter("userId"); final String password = request.getParameter("password"); using API // Performs certain authentication in organization specific way executeLDAPAuthentication(userId,password); AWSCredentials credentials = new BasicAWSCredentials(IAM User ID, Password); // SecurityToken Client AWSSecurityTokenService securityTokenService = new AWSSecurityTokenServiceClient(masterCredentials); GetFederationTokenRequest req = new GetFederationTokenRequest(); req.setName(userId); // Setting S3 Read only policy req.setPolicy(“{”Statement“: [{”Effect“: ”Allow“,”Action“: ["s3:Get*","s3:List*"],"Resource": "*"}]}"); // Getting Temporary Security Credentials GetFederationTokenResult result = securityTokenService.getFederationToken(req); Credentials cs = result.getCredentials(); String tempAccessId = cs.getAccessKeyId(); String tempSecretkey = cs.getSecretAccessKey(); String sessionToken = cs.getSessionToken(); 16
  • 35. Limitations Support for Temporary Users (As of Jan. 2012) CloudFront S3 CloudWatch SimpleDB DynamoDB(API Only) SQS EC2 SNS ElastiCache ELB RDS Route53
  • 36. Logon to Management Console Dedicated URL for Temporary Users  https://signin.aws.amazon.com/federation Steps for Logon  Access to: • /federation?Action=getSigninToken&SessionType=js on&Session={“sessionId”:””, ”sessionKey”:””, “sessionToken”:””}  Token for logon is returned in response to the above request  Redirected to: • /federation?Action=login&SigninToken=<Token>&De stination=<Management Console URL>
  • 37. How Identity Federation Works Company/Organization Temporary Credential Issuing Service Encrypts Token
  • 39. Consolidated Billing AWS bills for multiple accounts can be consolidated Single payment for multiple accounts All AWS fees are Billing Account charged to this account Sub Account Sub Account
  • 40. Benefits Centralized Billing Management Possible to check each account’s usage breakdown, e.g.  Each section  Each project Amount for Traffic and Stored Data used by all accounts is aggregated  Volume discount is applied for the aggregated amount Reserved Instance (RI) is flexibly applied  E.g. If a RI purchased by an account is not used, the discount would be automatically applied to another account
  • 41. Process to Apply Decide the billing account Approve at sub-accounts by checking Emails Create sub-accounts (And/or use existing accounts) Notify sub accounts from the billing account Consolidation (Send Email from the Established dedicated web page)
  • 42. Process to Apply Logon with the billing account and choose “Consolidated Billing”
  • 43. Process to Apply Send a request to each sub account
  • 44. Process to Apply Send a request to each sub account Email address of the sub account
  • 45. Process to Apply Sub account receives an Email from AWS
  • 46. Process to Apply Approve the request at Sub account
  • 47. Process to Apply Consolidated Billing Established
  • 48. After Consolidation Billing account gets additional field for sub accounts
  • 50. Closing Remarks IAM enables detailed access policy control for AWS operations Improved Security by creating different users and giving different policies Identity Federation with authentication systems in a company or organization Consolidated Billing enables  Centralized Billing Management  Checking breakdown for different accounts  More chances for volume discount
  • 51. Q&A Copyright © 2011 Amazon Web Services
  • 52. Thank You For Joining Copyright © 2011 Amazon Web Services