{"id":6142,"date":"2021-05-18T16:57:46","date_gmt":"2021-05-18T11:27:46","guid":{"rendered":"https:\/\/opstree.com\/blog\/\/?p=6142"},"modified":"2021-05-27T15:56:30","modified_gmt":"2021-05-27T10:26:30","slug":"aws-iam-the-challenge-part-1","status":"publish","type":"post","link":"https:\/\/opstree.com\/blog\/2021\/05\/18\/aws-iam-the-challenge-part-1\/","title":{"rendered":"AWS IAM: The challenge"},"content":{"rendered":"\n<p class=\"has-text-align-justify\">When we talk about security, AWS IAM is one of the most fundamental &amp; critical AWS service which needs suitable observation to design it because any careless &amp; negligible exercise leads to huge complication &amp; misshaping. AWS IAM is one of a kind which is ignored at the starting means not organise properly which leads to enormous complications while managing access to resources. Most of the time, a proper technique of managing AWS IAM access is ignored or doesn&#8217;t documented or configured properly due to which team has to change the IAM management format every time when there is a new requirement or modification. <\/p>\n\n\n\n<!--more-->\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.giphy.com\/media\/dXocbkT3YeFsgIYD1U\/giphy.gif\" alt=\"\" width=\"547\" height=\"308\" \/><\/figure><\/div>\n\n\n\n<p> <\/p>\n\n\n\n<p class=\"has-text-align-justify\">We cannot say that we can build an access management approach which doesn&#8217;t need any changes because it&#8217;s impossible to build an approach that doesn&#8217;t need any modification and provides full functionality for infrastructure environments. We cannot create fully functional approach but we can follow some practices which helps team to managing things in a proper manner.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2021\/03\/image-34.png?w=1024\" alt=\"\" class=\"wp-image-6346\" width=\"678\" height=\"222\" \/><\/figure><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Context <\/h5>\n\n\n\n<p class=\"has-text-align-justify\">So in this blog series, we will talk about IAM options and their use-cases , we will also talk about best practices while configuring IAM &amp; how to manage IAM access using Terraform. For this, we are creating blog series which will cover following topics:<\/p>\n\n\n\n<ul><li>AWS IAM: The challenge<\/li><li>AWS IAM: Best practices Part X<\/li><li>AWS IAM: Manage using Terraform<\/li><\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">What options we have<\/h5>\n\n\n\n<p class=\"has-text-align-justify\">Before diving into the IAM approaches, we will consider some options like policy, user, group &amp; roles that AWS IAM have and we will also talk some basics and importance of these AWS IAM options. So, AWS IAM itself a term which consist of powerful options like policy, roles, group, users and etc. We will cover and talk about these options that AWS IAM have.<\/p>\n\n\n\n<ul><li><strong>Policies<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-justify\">As per AWS <a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/access_policies.html\" target=\"_blank\" rel=\"noreferrer noopener\">official documentation<\/a>, A policy is an object in AWS that, when associated with an identity or resource, defines their permissions. AWS evaluates these policies when an IAM principal (user or role) makes a request.&nbsp;Permissions in the policies determine whether the request is allowed or denied.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-justify\">In simple words, policy is backbone of AWS identity access management which actually does all the logic like allow\/deny on the basis of rules we defined in IAM policy. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2021\/03\/image-20.png?w=472\" alt=\"\" class=\"wp-image-6300\" width=\"298\" height=\"379\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-justify\">All the rules will create using IAM policy object and most policies are stored in AWS as JSON documents. AWS also provided multiple ways to create and validate IAM polices like <a rel=\"noreferrer noopener\" href=\"https:\/\/awspolicygen.s3.amazonaws.com\/policygen.html\" target=\"_blank\">AWS Policy Generator<\/a> &amp; <a rel=\"noreferrer noopener\" href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/what-is-access-analyzer.html\" target=\"_blank\">IAM Access Analyzer<\/a>. IAM access analyzer is very powerful which not only validate but also provides multiple features like unintended access to AWS resources, Policy elements that don\u2019t conform to AWS best practices also maintained by IAM access analyzer.<\/p>\n\n\n\n<ul><li><strong>Users<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-justify\">IAM user is an object that we create in AWS which is provided to user or application. The main function of IAM user is to provide access to resources on the basis of policy that attached to IAM user. There are two types of request that IAM user can configure, first is AWS management console access &amp; other is programmatic access using credentials.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2021\/03\/image-31.png?w=1024\" alt=\"\" class=\"wp-image-6342\" width=\"581\" height=\"449\" \/><\/figure><\/div>\n\n\n\n<ul><li><strong>Roles<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-justify\">An IAM&nbsp;role is an identity with permission policies that determine what the user can and cannot do in AWS. However, a role does not have any credentials (password or access keys) associated with it. It is very similar to user because it uses request to provide access to AWS resources.<\/p>\n\n\n\n<p>There are multiple situation where IAM roles can be used:<\/p>\n\n\n\n<ol><li>grant the users to access the AWS resources in AWS account<\/li><li>Grant AWS resources access to another AWS resources<\/li><li>A role can be assigned to a federated user who signs in by using an external identity provider instead of IAM<\/li><li>Roles also used in AWS Security Token Service API<\/li><\/ol>\n\n\n\n<ul><li><strong>Group<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-justify\">An IAM group is a collection of IAM users. You can use groups to specify permissions for a collection of users, which can make those permission easier to manage for those users.<br>An IAM group hold IAM policies which is used by similar kind of users or users who wants to use policy specified in IAM group.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2021\/03\/image-21.png?w=855\" alt=\"\" class=\"wp-image-6308\" width=\"479\" height=\"341\" \/><\/figure><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Conclusion<\/h5>\n\n\n\n<p class=\"has-text-align-justify\">We learnt about different options of AWS IAM which is actually not scope of this blog series but it&#8217;s important to know about these options before diving into the main segment and these blog series not only for folks who already have depth or intermediate knowledge of AWS IAM but also for folks who understand &amp; have basic understanding about AWS IAM.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">This blog series will mainly focus on the approaches &amp; practices which can help in planning a structure or format for AWS IAM management. These approaches are not mandatory but according to use-case, anyone can follow any practices which can help them setting up AWS IAM in a proper way. Please let us know if you have any suggestions &amp; approach related to this blog or IAM.<\/p>\n\n\n\n<p>Stay tuned for upcoming AWS IAM blogs. Keep learning<\/p>\n\n\n\n<p> <a href=\"https:\/\/giphy.com\/\" target=\"_blank\" rel=\"noopener\">GIF reference<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p> <strong>Blog Pundit:<\/strong>   <strong><strong><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/opstree.com\/blog\/\/author\/kapendrasingh\/\" target=\"_blank\">Kapendra Singh<\/a><\/strong><\/strong><\/strong>  &amp; Sanjeev Pandey<\/p>\n\n\n\n<p>Opstree is an End to End DevOps solution provider<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.opstree.com\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\">CONTACT US<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we talk about security, AWS IAM is one of the most fundamental &amp; critical AWS service which needs suitable observation to design it because any careless &amp; negligible exercise leads to huge complication &amp; misshaping. AWS IAM is one of a kind which is ignored at the starting means not organise properly which leads &hellip; <a href=\"https:\/\/opstree.com\/blog\/2021\/05\/18\/aws-iam-the-challenge-part-1\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;AWS IAM: The challenge&#8221;<\/span><\/a><\/p>\n","protected":false},"author":192321000,"featured_media":29900,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[28070474],"tags":[768739294,225023486,69816,768739308,118966,718787996,691039495,125948448,768739286,20650],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/opstree.com\/blog\/wp-content\/uploads\/2025\/11\/DevSecOps-1.jpg","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfDBOm-1B4","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/6142"}],"collection":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/users\/192321000"}],"replies":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/comments?post=6142"}],"version-history":[{"count":26,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/6142\/revisions"}],"predecessor-version":[{"id":8997,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/6142\/revisions\/8997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/media\/29900"}],"wp:attachment":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/media?parent=6142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/categories?post=6142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/tags?post=6142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}