What are the 4 components of IAM?
- Access Management. ...
- Identity Governance and Administration. ...
- Privileged Access Management. ...
- Customer IAM. ...
- Adjacent Technologies.
IAM systems are designed to perform three key tasks: identify, authenticate, and authorize. Meaning, only the right persons should have access to computers, hardware, software apps, any IT resources, or perform specific tasks.
- Root Account – Don't use & Lock away access keys.
- User – Create individual IAM users.
- Groups – Use groups to assign permissions to IAM users.
- Permission – Grant least privilege.
- Passwords – Enforce strong password policy for users.
- MFA – Enable MFA for privileged users.
Here are some important characteristics of user groups: A user group can contain many users, and a user can belong to multiple user groups. User groups can't be nested; they can contain only users, not other user groups. There is no default user group that automatically includes all users in the AWS account.
- a principal is an IAM entity allowed to interact with AWS resources, and can be permanent or temporary, and represent a human or an application.
- three types of principals. ...
- Root User. ...
- IAM Users. ...
- Roles/Temporary Security Tokens.
The five pillars of IAM: Lifecycle and governance; federation, single sign-on and multi-factor authentication; network access control; privileged account management; and key encryption.
With AWS Identity and Access Management (IAM), you can specify who or what can access services and resources in AWS, centrally manage fine-grained permissions, and analyze access to refine permissions across AWS.
Guiding principles
All users should have a single CruzID in IAM. Support solutions that reduce the number of username/password combinations. Support solutions that reduce risk of intrusion when an account is compromised. Support solutions that remove access promptly when no longer needed.
Identity-based policies
There are two types of managed policies: AWS managed policies – Managed policies that are created and managed by AWS. Customer managed policies – Managed policies that you create and manage in your AWS account.
Which answer is INCORRECT regarding IAM Users? IAM Users access AWS with their root account credentials. This is incorrect as they use their username and password to access AWS.
What is AWS IAM Mcq?
AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM is a feature of your AWS account offered at no additional charge.
- Require multi-factor authentication (MFA) ...
- Rotate access keys regularly for use cases that require long-term credentials. ...
- Safeguard your root user credentials and don't use them for everyday tasks. ...
- Set permissions guardrails across multiple accounts.

- Adopt a Zero Trust Approach to Security. ...
- Identify and Protect High-Value Data. ...
- Enforce a Strong Password Policy. ...
- Use Multi-Factor Authentication (MFA) ...
- Automate Workflows. ...
- Adopt The Principle of Least Privilege. ...
- Enforce Just-in-Time Access Where Appropriate.
To access the services, you can use the AWS Management Console (a simple intuitive user interface), the Command Line Interface (CLI), or Software Development Kits (SDKs).
Cross-Account Access: granting permissions to users from other AWS account, whether you control those account or not. Identity Provider Access: granting permissions to users authenticated by a trusted external system.
In this policy, there are four major JSON elements: Version, Effect, Action, and Resource. The Version element defines the version of the policy language.
- Workforce identity. The average business makes use of a wide variety of applications. ...
- Customer Identity (CIAM) ...
- B2B identity. ...
- Single Sign-On (SSO) ...
- Federated Identity. ...
- Multi-factor authentication (MFA) ...
- Anomaly detection. ...
- Cost and time savings.
This identity is called the AWS account root user and is accessed by signing in with the email address and password that you used to create the account.
The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.
The most important duty of an IAM manager is to ensure that authorized users have the right access to company systems, data, and applications. Here are some typical job duties that employers post online: Plan, implement, and manage identity and access management solutions.
What are the authentication in AWS Mcq?
What is AWS Multi-Factor Authentication (MFA)? Taking multiple factors into consideration when creating an AWS account. A process that authenticates accounts by approving the background factors of each user. A practice that adds increased security to an account by using multiple forms of authentication.
We don't recommend generating access keys for your root user, because they allow full access to all your resources for all AWS services, including your billing information. Don't use your root user for everyday tasks. Use the root user to complete the tasks that only the root user can perform.
A customer managed policy is a standalone policy that you administer in your own AWS account. An inline policy is a policy that's embedded in an IAM identity (a user, group, or role).
Depending on the use case, individual IAM users can be assigned to entitlements or role-based-access groups.
IAM Credentials report lists all your account's users and the status of their various credentials. The other IAM Security Tool is IAM Access Advisor.