11 AWS Identity Management Best Practices to Live By

 

 

With 30% of the global public cloud computing market share, e-Retail giant Amazon.com’s cloud computing branch, Amazon Web Services, is the most dominant cloud service provider on the planet, and as such their services are likely an integral part of many of your IT toolboxes. So how can you manage identity and federate access in your AWS cloud?

Last week we shared Erik Paulsson’s tips on using AWS’s build in IAM services, and now we’re back with more: 11 IAM Best Practices to Live By, brought to you by the AWS Identity and access team themselves.

The session covers AWS Identity and Access Management (IAM) best practices that help improve your security posture. AWS IAM experts explain how to manage users and their security credentials and go over why you should delete your root access keys—or at the very least, rotate them regularly. Using common use cases, Amazon’s experts demonstrate when to choose between using IAM users and IAM roles and explore how to set permissions to grant least privilege access control in one or more of your AWS accounts.

 

Follow Jeff

Jeff Edwards

Editor, Cybersecurity at Solutions Review
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff