Copy of Task Statement 1.1: Design secure access to AWS resources

We will explore how SecureCart, a growing e-commerce company, builds secure access to AWS resources using best practices, role-based access control (RBAC), multi-account security, and federated access.

We’ll focus on different aspects of AWS Identity & Access Management (IAM), AWS security best practices, and access controls across multiple accounts.

Order

Topic

Key AWS Services

1

AWS Identity & Access Management (IAM) Fundamentals

Users, Groups, Roles, Policies,Federation,Access Analyzer

2

Role-Based Access Control (RBAC) and Temporary Credentials

IAM Roles, AWS STS, IAM Policies

3

Securing Access Across Multiple AWS Accounts

AWS Organizations, SCPs, AWS Control Tower

4

Federated Access and Directory Services

AWS IAM Identity Center (SSO), AWS STS, AD Federation

5

IAM Policies and Resource Policies

IAM Conditions, Resource Policies, Access Analyzer

6

Hands-on Labs & Final Challenge

Real-world IAM security scenarios


Last updated