IAM Role Revoking and Permissions Boundary

提供方
Coursera Project Network
在此指导项目中,您将:

Obtain the temporary credentials generated by Role (STS)

Revoke active sessions of IAM Role

Create IAM User with Permissions Boundary

Clock2 hours
Intermediate中级
Cloud无需下载
Video分屏视频
Comment Dots英语(English)
Laptop仅限桌面

By the end of this Project, you will be able to learn how and when to revoke an IAM Role. In this scenario, we are going to deal with a real time example. Suppose, you are working as a security analyst with a global organization called "XYZ". You assigned an IAM role to an EC2 instance and the temporary credentials generated by the role assumption got leaked to a third party. Lets see how can we deal with this situation in an ideal way. This project also reviews the functionality provided by Permission Boundaries and looks at a common use case permission delegation. After completing this Project, you will get a detailed idea of Role Revoking and Permission Boundary.

您要培养的技能

  • Confidentiality
  • Cloud Computing Security
  • Tailored Access Operations
  • Identity Management (IDM)
  • Access Control

分步进行学习

在与您的工作区一起在分屏中播放的视频中,您的授课教师将指导您完成每个步骤:

  1. Create the Project environment

  2. Obtain the temporary credentilas generated by STS, when assuming an IAM Role

  3. Role Revoking

  4. IAM Permissions Boundary

  5. Cleaning the Project Environment

指导项目工作原理

您的工作空间就是浏览器中的云桌面,无需下载

在分屏视频中,您的授课教师会为您提供分步指导

常见问题

常见问题

还有其他问题吗?请访问 学生帮助中心