Trusted answers to developer questions

How to secure our AWS accounts

Get Started With Data Science

Learn the fundamentals of Data Science with this free course. Future-proof your career by adding Data Science skills to your toolkit — or prepare to land a job in AI, Machine Learning, or Data Analysis.

This shot lists five steps we can follow to secure our Amazon Web Services (AWS) account.

If our AWS root user account is compromised, every resource and data in our account can be exposed to attackers. Therefore, we should make sure we don’t share our account credentials with anyone. To keep our root account secure, it’s a good practice to:

  • Delete the access keys associated with the root account.
  • Enable Multi-Factor Authentication (MFA).

Following the principle of least privilege

In information security, the principle of least privilege dictates that we give users the least amount of access necessary to complete their tasks.

It is advised to grant users only the permissions that are necessary to do a particular job. We should start by denying all permissions, and then grant additional permissions as necessary for the user, group, or role.

Using IAM for all authorizations

Identity and Access Management (IAM) provides a way to create and manage users, groups, and roles that provide secure access to our AWS account and resources.

Using IAM roles

It is easier to maintain roles than users. When we assume an IAM role, a short-term temporary credential allows us to access the resource temporarily. After some time, the given temporary credential expires automatically.

Using an identity provider

An Identity Provider (IdP) is a trusted third-party company that creates and manages an AWS user identity and associated identity attributes.

Using an IDP allows us to use identities that are federated from our IDP for access control.

Conclusion

Securing our AWS account is crucial to the overall security of our applications. Thus, we should follow these steps to ward off security threats and safely use AWS.

RELATED TAGS

aws
iam
Did you find this helpful?