AWS Rookie #1 - Setting up Identity and Access Management

· #cloud

You know when you just get tired of everything else you’ve been working on the last few years and decide to start fresh?

That’s not what happened to me.

I still love what I do and I’ll keep working on my side projects and learning new languages and everything. It’s just that I’ve been reading a lot about the cloud architecture and I’m starting to feel like I need to invest in this.

So, this is it. This is the start of my journey through AWS and I’ll try to describe all of the things that helped me on this path. All the good resources, cool people and tools will be featured here. Wish me luck \o/

IAM - Identity and Access Management

The Identity and Access Management (IAM) is a AWS service that enables you to manage the access to your AWS services and resources.

With IAM you can control who has access to your AWS account, what type of access they have to what service and what actions can be executed.

There’s a set of keywords that are crucial to understanding this service, as described below:


Best Practices

Lock your account root user and create individual IAM users

The root account access key gives full access to all the services and billing information, therefore root access should be handled very carefully.

Enable multi-factor authentication for all users

MFA grants you another layer of protection. If some user’s access is compromised, there’s still another layer of security to be broken by some kind of attacker.

Grant least privilege to users and resources

Give your users and resources only the necessary permissions to perform the specific task that they’ll be working on.

Configure a strong password policy for your users

Everyone should avoid “password” and “123456” passwords. Make your users choose strong ones, with numbers and special characters with minimum number of characters.

Monitor activity in your AWS account and Remove unnecessary credentials

Monitoring your AWS logs can be useful to check the date and time of each users’ actions, and therefore review their permissions and remove credentials that aren’t related to them.

Setup CloudTrail

CloudTrail creates a “trail” of events for actions taken by a user, role, or an AWS service.

Don’t commit credentials to git

This one is just common sense actually.


IAM may seem a really basic tool when you start using it, but as the complexity of your systems increases, so does the amount of attention you have to give to IAM.

Hope you enjoyed this first chapter, stay tuned for more! ;D

Cool Resources