.:PROUDLY PRESENTS:.
Cloud Academy Understanding of AWS Authentication, Authorization & Accounting
Release Date.: 06-09-2019
Type.: Bookware
Disks.: 28x50mb
Link.: https://cloudacademy.com
Release Notes
Cloud Security is a huge topic, mainly because it has so
many different areas of focus. This course focuses on three
areas that are fundamental, AWS Authentication,
Authorisation and Accounting.
These three topics can all be linked together and having an
understanding of the different security controls from an
authentication and authorization perspective can help you
design the correct level of security for your
infrastructure. Once an identity has been authenticated and
is authorised to perform specific functions it's then
important that this access can be tracked with regards to
usage and resource consumption so that it can be audited,
accounted and billed for.
The course will define and discuss each area, and iron out
any confusions of meaning between various security terms.
Some people are unaware of the differences between
authentication, authorization and access control, this
course will clearly explain the differences here allowing
you to use the correct terms to describe your security solutions.
From an AWS authentication perspective, a number of
different mechanisms are explained, such as Multi-Factor
AWS Authentication (MFA), Federated Identity, Access Keys
and Key Pairs. With the help of demonstrations, you can
learn how to apply access keys to your AWS CLI for
programmatic access and understand the differences between
Linux and Windows authentication methods using AWS Key Pairs.
When we dive into understanding authorization we cover IAM
Users, Groups, Roles and Policies, providing examples and
demonstrations. Within this section, S3 authorization is
also discussed, looking at access control lists (ACLs) and
Bucket Policies. Moving on from S3, we look at network and
instance level authorization with the help of Network
Access Control Lists (NACLs) and Security Groups.
Finally, the Accounting section will guide you through the
areas of Billing & Cost Management that you can use to help
identify potential security threats. In addition to this,
we explain how AWS CloudTrail can be used to track API
calls to analyse what users are doing and when. This makes
CloudTrail a strong tool in tracking, identifying and
monitoring a user's actions within your AWS environment.
Greetings fly out to:
Kodemusen, KoseBamsen
STM is back.
For all the ppl we worked with
in the past. We salute you.
NFO by NiMiTech
Updated: 09/09/2002