From the course: Cloud Security for DevSecOps Engineers: From Security Models to API Protection

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Controlling access to cloud resources using IAM

Controlling access to cloud resources using IAM

- [Instructor] By this point in the course, you know that you can access cloud computing resources by simply logging into a website and uploading files or provisioning infrastructure. However, none of that would be possible without IAM or identity and access management. Let's define IAM and its models for controlling access within the cloud. According to John Martinez, "a cloud identity and access management system comprises the tools, policies, and processes that protect the company's critical resources across cloud services and platforms." To add, cloud IAM is very complex and helps protect resources in the cloud by mitigating a wide variety of cyber attacks. IAM comes with several benefits. Cloud IAM platforms and services provide you with a centralized dashboard, making it easy to enable single sign-on or SSO, federated identity or create cloud specific permissions and policies for users. With that in mind, IAM and the cloud was meant to scale. Cloud IAM services allow for…

Contents