From the course: Cloud Security for DevSecOps Engineers: From Security Models to API Protection
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Controlling access to cloud resources using IAM
From the course: Cloud Security for DevSecOps Engineers: From Security Models to API Protection
Controlling access to cloud resources using IAM
- [Instructor] By this point in the course, you know that you can access cloud computing resources by simply logging into a website and uploading files or provisioning infrastructure. However, none of that would be possible without IAM or identity and access management. Let's define IAM and its models for controlling access within the cloud. According to John Martinez, "a cloud identity and access management system comprises the tools, policies, and processes that protect the company's critical resources across cloud services and platforms." To add, cloud IAM is very complex and helps protect resources in the cloud by mitigating a wide variety of cyber attacks. IAM comes with several benefits. Cloud IAM platforms and services provide you with a centralized dashboard, making it easy to enable single sign-on or SSO, federated identity or create cloud specific permissions and policies for users. With that in mind, IAM and the cloud was meant to scale. Cloud IAM services allow for…
Contents
-
-
-
-
Risks in public cloud5m 58s
-
(Locked)
Understanding cloud security controls7m 17s
-
(Locked)
Controlling access to cloud resources using IAM7m 37s
-
(Locked)
Protecting data at rest and in transit3m 12s
-
(Locked)
Protecting data with encryption and secrets management6m 13s
-
(Locked)
Logging and monitoring fundamentals5m 7s
-
(Locked)
Network security explained5m 14s
-
(Locked)
Tagging, labels, and governance7m 31s
-
-
-
-