AWS IAM Policy Variables Demo 2021 (Yann Stoneman)

preview_player
Показать описание

See also:

The policy we use:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"iam:ListUsers",
"iam:GetAccountPasswordPolicy"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"iam:*AccessKey*",
"iam:ChangePassword",
"iam:GetUser",
"iam:*ServiceSpecificCredential*",
"iam:*SigningCertificate*"
],
"Resource": ["arn:aws:iam::*:user/${aws:username}"]
}
]
}

Follow Yann Stoneman

#AWSIAMpolicyvariables2021 #aws #amazonewebservices #yannstoneman #IAMdocumentationpolicy #rotateyourcredentials #devops #devsecops #cybersecurity #cloudcomputing #cloud
Рекомендации по теме
Комментарии
Автор

Good video.
Does AWS have any feature to validate or to see these policy variables on console? and Can we use one ResouceTag across multiple service? For example, use sagemaker ResourceTag with Glue actions.

Thanks.

newjaa