Slide-5 (AWS - IAM)
Slide-5 (AWS - IAM)
Slide-5 (AWS - IAM)
2003: 2006:
Amazon infrastructure is Re-launched
one of their core strength. publicly with
Idea to market SQS, S3 & EC2
AWS Cloud Number Facts
• In 2019, AWS had
$35.02 billion in annual
revenue
• AWS accounts for 47% of
the market in 2019
(Microsoft is 2nd with 22%)
• Pioneer and Leader of the
AWS Cloud Market for
the 9th consecutive year
• Over 1,000,000 active
users
Gartner Magic Quadrant
AWS Cloud Use Cases
• AWS enables you to build sophisticated, scalable
applications
• Applicable to a diverse set of industries
• Use cases include
• Enterprise IT, Backup & Storage, Big Data analytics
• Website hosting, Mobile & Social Apps
• Gaming
AWS Global Infrastructure
• AWS Regions
• AWS Availability Zones
• AWS Data Centers
• AWS Edge
Locations / Points of
Presence
AWS Regions
• AWS has Regions all around the world
• Names can be us-east-1, eu-west-3 …
• A region is a cluster of data centers
• Region Table:
IAM Section
• Authentication:
• Authorization:
Authentication Authorization
In the authentication process, the identity of users are While in authorization process, a the person’s or user’s
checked for providing the access to the system. authorities are checked for accessing the resources.
In the authentication process, users or persons are While in this process, users or persons are validated.
verified.
It is done before the authorization process. While this process is done after the authentication
process.
It needs usually the user’s login details. While it needs the user’s privilege or security levels.
Authentication determines whether the person is user or While it determines What permission does the user
not. have?
The authentication credentials can be changed in part as The authorization permissions cannot be changed by
and when required by the user. user as these are granted by the owner of the system
and only he/she has the access to change it.
The user authentication is identified with username, The user authorization is carried out through the access
password, face recognition, retina scan, fingerprints, etc. rights to resources by using roles that have been pre-
defined
Example: Employees in a company are required to Example: After an employee successfully authenticates,
authenticate through the network before accessing their the system determines what information the employees
company email. are allowed to access.
IAM: Users & Groups
• IAM = Identity and Access Management, Global service
• Root account created by default, shouldn’t be used or shared
• Users are people within your organization, and can be grouped
• Groups only contain users, not other groups
• Users
Group:don’t have to belong to a group, and user can belong
Developers to multiple
Group: Operations
Group
groups Audit Team
Developers Operations
inline
Alice