question archive Individual Project My Individual Project 2 will detail and illustrate uses and explain how AWS Identity and Access Management (IAM) works

Individual Project My Individual Project 2 will detail and illustrate uses and explain how AWS Identity and Access Management (IAM) works

Subject:Computer SciencePrice: Bought3

Individual Project

My Individual Project 2 will detail and illustrate uses and explain how AWS Identity and Access Management (IAM) works. Ideally, AWS IAM allows a user to manage the access to the resources and services of AWS safely. Through IAM, a user can manage and create AWS groups and users as well as employ permissions to either deny or allow these users to access the resources of AWS. Typically, IAM is provided in the AWS account at zero charges because the account holder would only be charged for using the services of AWS by his or her users. Therefore, this project will demonstrate in-depth the uses of AWS IAM as well as illustrate how this service works.

The first task of the project will detail the uses of IAM. The first use of IAM is that it allows the users to manage the access to the specific resources and service APIs of AWS. Besides, it allows a user to include specific conditions, for instance, the time to control the usage of AWS by a user, the user’s originating IP address, whether there has been the use of a multi-factor authentication device, and whether a user is using SSI (Zahoor, Asma & Perrin, 2017). This will be further demonstrated in the project. Besides, another crucial use of IAM is that it helps a user determine access to the AWS account. Moreover, a user can easily refine and identify their policies to enable access to the services that are being used only.

The second task will be to demonstrate how IAM helps in developing permissions and roles. The first permission is it allows an individual to manage the users and their access to IAM (Nadon, 2017). This is done by creating users and assigning each user separate security credentials such as passwords and access keys. Furthermore, it would allow a user to request short-lived security credentials to allow these users access the resources and services of AWS. The second permission is it allows an individual to manage the roles and permissions of IAM. Technically, an individual could develop a role as well as manage permissions to determine the operations that would be performed by the AWS service of the entity. These will also be demonstrated in the second project.

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE