Create a shared folder in your Google drive, upload a README file and video recording(s) into the folder. The folder should be sharable to any account (can be reviewed by the instructor and the class

Running head: INDIVIDUAL PROJECT 1







Name:

700#:

Course #: CS 5610

Semester: Fall 2021

Discussion 2: Tasks for Individual Project 2

Individual Project

My Individual Project 2 will detail and illustrate uses and explain how AWS Identity and Access Management (IAM) works. Ideally, AWS IAM allows a user to manage the access to the resources and services of AWS safely. Through IAM, a user can manage and create AWS groups and users as well as employ permissions to either deny or allow these users to access the resources of AWS. Typically, IAM is provided in the AWS account at zero charges because the account holder would only be charged for using the services of AWS by his or her users. Therefore, this project will demonstrate in-depth the uses of AWS IAM as well as illustrate how this service works.

The first task of the project will detail the uses of IAM. The first use of IAM is that it allows the users to manage the access to the specific resources and service APIs of AWS. Besides, it allows a user to include specific conditions, for instance, the time to control the usage of AWS by a user, the user’s originating IP address, whether there has been the use of a multi-factor authentication device, and whether a user is using SSI (Zahoor, Asma & Perrin, 2017). This will be further demonstrated in the project. Besides, another crucial use of IAM is that it helps a user determine access to the AWS account. Moreover, a user can easily refine and identify their policies to enable access to the services that are being used only.

The second task will be to demonstrate how IAM helps in developing permissions and roles. The first permission is it allows an individual to manage the users and their access to IAM (Nadon, 2017). This is done by creating users and assigning each user separate security credentials such as passwords and access keys. Furthermore, it would allow a user to request short-lived security credentials to allow these users access the resources and services of AWS. The second permission is it allows an individual to manage the roles and permissions of IAM. Technically, an individual could develop a role as well as manage permissions to determine the operations that would be performed by the AWS service of the entity. These will also be demonstrated in the second project.

References

Nadon, J. (2017). Introduction to AWS Free Tier. In Website Hosting and Migration with Amazon Web Services (pp. 7-14). Apress, Berkeley, CA.

Zahoor, E., Asma, Z., & Perrin, O. (2017, September). A formal approach for the verification of AWS IAM access control policies. In European Conference on Service-Oriented and Cloud Computing (pp. 59-74). Springer, Cham.