The email address you use for AWS. It has full administration access. It is important to secure this account.
To secure the account on the dashboard, you want to go into IAM and secure the root account.
Always turn on multi-factor authentication.
To control permissions using IAM we assign policy documents (which are written in JSON). Full admin access example:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "*", "Resource": "*" } ] }
You can assign IAM policy documents to:
IAM does not require a region as it is global.
When heading to Policies
within IAM, you'll find AWS managed policy or you can create your own.
It is best practice for users to inherit permissions from groups.
The principle of least priviledge: assign a user the minimum amount of privileges they need to do their job.
Amazon also have prepopulated policies for job roles.
Within the IAM Account Settings
, we can enforce our password policies. We can enable things such as expiration, have users change their password, reuse etc.
You can also manage the provider to log in with ie SAML
or OpenID Connect
. You can need to configure that trust - it's beyond the scope of the exam but active directory federation is possible.
Afterwards, you should no longer have to log into AWS with the root account again.
Remember: