IAM Role Revoking and Permissions Boundary

ofrecido por
En este proyecto guiado, tú:
2 hours
Intermedio
No se necesita descarga
Video de pantalla dividida
Inglés (English)
Solo escritorio

By the end of this Project, you will be able to learn how and when to revoke an IAM Role. In this scenario, we are going to deal with a real time example. Suppose, you are working as a security analyst with a global organization called "XYZ". You assigned an IAM role to an EC2 instance and the temporary credentials generated by the role assumption got leaked to a third party. Lets see how can we deal with this situation in an ideal way. This project also reviews the functionality provided by Permission Boundaries and looks at a common use case permission delegation. After completing this Project, you will get a detailed idea of Role Revoking and Permission Boundary.

Habilidades que desarrollarás

  • Confidentiality

  • Cloud Computing Security

  • Tailored Access Operations

  • Identity Management (IDM)

  • Access Control

Aprende paso a paso

En un video que se reproduce en una pantalla dividida con tu área de trabajo, tu instructor te guiará en cada paso:

Cómo funcionan los proyectos guiados

Tu espacio de trabajo es un escritorio virtual directamente en tu navegador, no requiere descarga.

En un video de pantalla dividida, tu instructor te guía paso a paso

Preguntas Frecuentes