Chapter 5 - Securing Your AWS Resources


AWS IAM (Identity and Access Management)


Protecting the Root User
Authentication
Passwords
Access Keys
Secure Shell Key Pairs
Users, Groups, and Roles
IAM User
IAM Groups
IAM Roles

Providing Federated Access



Credential Report



Encryption



Regulatory Compliance (AWS Artifact)