AWS Security Blog
Tag: IAM
An Easier Way to Determine the Presence of AWS Account Access Keys
Last month, the AWS Security Blog encouraged you to adhere to AWS Identity and Access Management (IAM) best practices. One of these best practices is to lock away your AWS account (root) access keys and password, and not use them for day-to-day interaction with AWS. In fact, when it comes to your root account access […]
In Case You Missed These: Some Recent AWS-Related Security Articles
With the steady stream of updates and enhancements for AWS services, it can be easy to miss important information about features related to security. Here are some recent security-related updates and announcements about AWS services that you might not have heard about yet. Customizable security groups and multiple task instances now available for Amazon EMR […]
Make a New Year Resolution: Adhere to IAM Best Practices
As another new year begins, we want to encourage you to be familiar with recommended AWS Identity and Access Management (IAM) best practices. Following these best practices can help you maintain the security of your AWS account. You can learn more by watching the IAM Best Practices presentation that was given by Anders Samuelsson at […]
Enable a New Feature in the AWS Management Console: Cross-Account Access
Today, we made it possible for you to enable a user to switch roles directly in the AWS Management Console to access resources across multiple AWS accounts—while using only one set of credentials. Previously, as Anders discussed in his blog post, Delegating API Access to AWS Services Using IAM Roles, you could delegate access to […]
A Recap of the AWS Security Blog in 2014
The goal of the AWS Security blog is to provide you with guidance, best practices, and technical walkthroughs covering new service launches or topics such as how to help increase the security of your AWS account or better achieve your compliance goals. As we welcome 2015, we want to make sure that you did not […]
Coming March 2015: Upgrades to IAM Policy Validation
Several weeks ago, we released documentation for the AWS Identity and Access Management (IAM) policy grammar and published a back-to-school policy grammar blog post to let you know of common errors in policies. To help you ensure that your policies match your intentions, we are taking policy validation a step further. Starting March 2015, any new or updated policy must […]
A Simple Way to Export Your IAM Settings
Do you analyze, audit, or monitor your AWS Identity and Access Management (IAM) settings? If so, you will be happy to hear we’ve simplified the way you can retrieve a snapshot of your IAM settings. Today we’re making it easier for you to build tools to analyze, monitor, and audit your IAM entities (i.e., users, […]
Back to School: Understanding the IAM Policy Grammar
Have you ever had to create access policies for users, groups, roles, or resources and wished you could learn more about the policy language? If so, you’ve come to the right place. In this blog, I’ll describe the attributes and structure of the Identity and Access Management (IAM) policy language. I’ll also include examples that […]
Building an App Using Amazon Cognito and an OpenID Connect Identity Provider
January 11, 2023: This blog post has been updated to reflect the correct OAuth 2.0 endpoint for the Identity Provider (IdP) used and to use an updated version of the AWS SDK for JavaScript. This post has also been refreshed with updated steps to configure an Amazon Cognito Identity Pool and creating a Connected App […]
New in the IAM Console: An At-a-Glance View of Last AWS Sign-In
Have you ever needed to quickly look up the last time one of your users signed in to your AWS account? Or have you been following security best practices and want verify that no one in your organization has been signing in using the AWS root account? If you use AWS CloudTrail, the information is […]