JavaScript required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
Gallery
1. AWS Identity and Access Management (IAM)
AWS Identity and Access Management (IAM)
IAM Elements
IAM Authentication Methods
IAM Users
IAM Groups
IAM Roles
IAM Policy
Permission Boundary
IAM Policy Evaluation Logic
IAM Best Practices
Misc
More
Share
Explore
IAM Best Practices
Secure AWS Resources
Root User Security
: Secure root user access keys.
Role Delegation
: Use roles to delegate permissions.
Least Privilege
: Grant least privilege.
Managed Policies
: Utilize AWS managed policies.
Policy Validation
: Regularly validate policies.
IAM Management
Customer Managed Policies
: Prefer customer managed policies over inline policies.
Access Level Review
: Use access levels to review IAM permissions.
Strong Password Policy
: Configure strong password policy.
Multi-Factor Authentication (MFA)
: Enable MFA.
Application Security
EC2 Instance Roles
: Use roles for applications running on EC2 instances.
Access Key Management
: Do not share access keys.
Credential Rotation
: Regularly rotate credentials.
Credential Cleanup
: Remove unnecessary credentials.
Policy Enforcement
Policy Conditions
: Utilize policy conditions for extra security.
Activity Monitoring
: Monitor activity in AWS account.
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.