# Task Statement 1.1: Design secure access to AWS resources

We will explore how SecureCart, a growing e-commerce company, builds secure access to AWS resources using best practices, role-based access control (RBAC), multi-account security, and federated access.

We’ll focus on different aspects of AWS Identity & Access Management (IAM), AWS security best practices, and access controls across multiple accounts.

| **Order** | **Topic**                                                  | **Key AWS Services**                                      |
| --------- | ---------------------------------------------------------- | --------------------------------------------------------- |
| **1**     | AWS Identity & Access Management (IAM) Fundamentals        | Users, Groups, Roles, Policies,Federation,Access Analyzer |
| **2**     | Role-Based Access Control (RBAC) and Temporary Credentials | IAM Roles, AWS STS, IAM Policies                          |
| **3**     | Securing Access Across Multiple AWS Accounts               | AWS Organizations, SCPs, AWS Control Tower                |
| **4**     | Federated Access and Directory Services                    | AWS IAM Identity Center (SSO), AWS STS, AD Federation     |
| **5**     | IAM Policies and Resource Policies                         | IAM Conditions, Resource Policies, Access Analyzer        |
| **6**     | Hands-on Labs & Final Challenge                            | <p></p><p>Real-world IAM security scenarios</p>           |

***
