IAM Role Revoking and Permissions Boundary

제공자:
Coursera Project Network
학습자는 이 안내 프로젝트에서 다음을 수행하게 됩니다.

Obtain the temporary credentials generated by Role (STS)

Revoke active sessions of IAM Role

Create IAM User with Permissions Boundary

Clock2 hours
Intermediate중급
Cloud다운로드 필요 없음
Video분할 화면 동영상
Comment Dots영어
Laptop데스크톱 전용

By the end of this Project, you will be able to learn how and when to revoke an IAM Role. In this scenario, we are going to deal with a real time example. Suppose, you are working as a security analyst with a global organization called "XYZ". You assigned an IAM role to an EC2 instance and the temporary credentials generated by the role assumption got leaked to a third party. Lets see how can we deal with this situation in an ideal way. This project also reviews the functionality provided by Permission Boundaries and looks at a common use case permission delegation. After completing this Project, you will get a detailed idea of Role Revoking and Permission Boundary.

개발할 기술

  • Confidentiality
  • Cloud Computing Security
  • Tailored Access Operations
  • Identity Management (IDM)
  • Access Control

단계별 학습

작업 영역이 있는 분할 화면으로 재생되는 동영상에서 강사는 다음을 단계별로 안내합니다.

  1. Create the Project environment

  2. Obtain the temporary credentilas generated by STS, when assuming an IAM Role

  3. Role Revoking

  4. IAM Permissions Boundary

  5. Cleaning the Project Environment

안내형 프로젝트 진행 방식

작업 영역은 브라우저에 바로 로드되는 클라우드 데스크톱으로, 다운로드할 필요가 없습니다.

분할 화면 동영상에서 강사가 프로젝트를 단계별로 안내해 줍니다.

자주 묻는 질문

자주 묻는 질문

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.