IAM Role Revoking and Permissions Boundary

提供方
Coursera Project Network
在此指導項目中,您將:

Obtain the temporary credentials generated by Role (STS)

Revoke active sessions of IAM Role

Create IAM User with Permissions Boundary

Clock2 hours
Intermediate中級
Cloud無需下載
Video分屏視頻
Comment Dots英語(English)
Laptop僅限桌面

By the end of this Project, you will be able to learn how and when to revoke an IAM Role. In this scenario, we are going to deal with a real time example. Suppose, you are working as a security analyst with a global organization called "XYZ". You assigned an IAM role to an EC2 instance and the temporary credentials generated by the role assumption got leaked to a third party. Lets see how can we deal with this situation in an ideal way. This project also reviews the functionality provided by Permission Boundaries and looks at a common use case permission delegation. After completing this Project, you will get a detailed idea of Role Revoking and Permission Boundary.

您要培養的技能

  • Confidentiality
  • Cloud Computing Security
  • Tailored Access Operations
  • Identity Management (IDM)
  • Access Control

分步進行學習

在與您的工作區一起在分屏中播放的視頻中,您的授課教師將指導您完成每個步驟:

  1. Create the Project environment

  2. Obtain the temporary credentilas generated by STS, when assuming an IAM Role

  3. Role Revoking

  4. IAM Permissions Boundary

  5. Cleaning the Project Environment

指導項目工作原理

您的工作空間就是瀏覽器中的雲桌面,無需下載

在分屏視頻中,您的授課教師會為您提供分步指導

常見問題

常見問題

還有其他問題嗎?請訪問 學生幫助中心