AWS - IAM
- Identity Access Management
- AWS 리소스 접근 제어
AWS Identity
- Root Account
- Administrator
- AWS web console & AWS API
- IAM - User, Role
- 제한된 AWS Web console & AWS API
- STS (Security Token Service)
- 제한된 AWS web console & AWS API
- life-time
AWS IAM Policy
- AWS 서비스와 리소스에 대한 인가 기능 제공
AWS IAM Policy 종류
- SCP (Service Control Policy)
- AWS Organizations 내 정책
- OU or AWS Account 레벨에서의 정책
- Permission Policy, Permission Boundary
- IAM User, Role에 대한 정책
- Boundary: IAM User, Role에 할당된 권한 제한
- Session Policy
- STS, Federation시 권한 제어
- Resource-based Policy
- Identity가 아니라 AWS Resource자체에 권한 제어
- S3, SQS, KMS, ECR, ...
- Endpoint Policy
- Gateway type vpc endpoint
AWS IAM Policy (JSON Format)
{ "Statement" : { "Effect": "Allow", "Principle": { ... }, "Action": [ "ec2:*" ], "Resource": [ "*" ], "Condition": { ... } } }
IAM Policy Example #1
{ "Version" : "2012-10-17" "Statement" : [ { "Sid": "DenyAllButProductManagers", "Effect": "Deny". "Principal" : { "AWS" : "*" }, "Action" : [ "s3:PutObject" ], "Condition" : { "StringNotEquals" : { "aws:PrincipalTag/job-title": "Product-Manager" } } } ] }
AWS IAM Use Case
AWS Access Management
- Resource를 생성하지 않은 다른계정
- Organation SCP and Identity-Based-Policy and Permissions-Boundary and Resource-Based-Policy
- Resource를 생성한 동일계정
- Organation SCP or Identity-Based-Policy or Permissions-Boundary or Resource-Based-Policy
0 Comments