-
Access Keys
A set of credentials used to gain access to an AWS account and make calls against AWS APIs.
-
Amazon GuardDuty
Amazon GuardDuty is an threat detection tool in AWS that is pre-configured to detect a number of potential AWS-specific threats to your workloads.
-
Amazon Inspector
Amazon Inspector is an automated vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure.
-
Amazon S3
Amazon Simple Storage Service is a service that allows any individual or company to store data with arbitrary sizes and data structures.
-
-
AWS Account
the smallest complete unit of AWS services that exist. You can’t use AWS without using an account.
-
-
AWS CloudShell
a browser-based shell that allows you to use AWS resources with pre-authentication from your console credentials.
-
AWS CloudTrail
a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.
-
AWS EC2
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that allows developers to provision virtual networks and servers in the cloud.
-
AWS IAM
AWS Identity and Access Management allows you to specify who can access specific AWS services and resources, and under which conditions.
-
AWS Organizations
allows an organization to manage a large # of accounts using centralized controls and management capabilities.
-
AWS Resources
the “atomic” unit for AWS. An individual resource may represent an IAM “User” or EC2 “Instance” (Virtual Server).
-
AWS Services
the aggregation of common resources. AWS IAM and AWS EC2 are examples of services that aggregate IAM principals and EC2 Virtual Servers.
-
AWS SSO
AWS Single Sign-On (AWS SSO) is a centralized administration tool where you can control and customize access for (primarily) human identities.
-
Human Identities
Anyone internally or externally that has access to your AWS environments and applications.
-
IAM Principal
a user, role or group in AWS IAM that has access to AWS resources.
-
IAM Role
an IAM identity that can be set with specific permissions and can be used by anyone that is allowed "assume", or gain access to, it.
-
IAM User
name and credentials used in AWS to represent a specific person or application that interacts in an AWS environment. It can only be used by that person or application.
-
IaaS (Infrastructure as a Service)
a cloud computing service provider manages servers and storage, networking firewalls/security, and the data center for you. You control the hosted applications, development tools, database management, business analytics, and operating systems. Compared
to PaaS (Platform as a Service) and SaaS (Software as a Service), this offers the most access to the end user.
-
IdP
IAM Identity Providers (IdP) allow you to manage identities of external users of AWS, using SSO instead of creating new IAM users.
-
-
Machine Identities
Any internal or external tools that make requests on your behalf to AWS services, if the tool is provided its own unique identity.
-
MFA (Multi-factor authentication)
an authentication feature for account login that requires you to use an additional trusted device or token to validate your identity.
-
PaaS (Platform as a Service)
a cloud computing service provider manages servers and storage, networking firewalls/security, data center buildings, development tools, database management, business analytics, and operating systems for you. You control the hosted applications. This
offers you more access than SaaS (Software as a Service), but less than IaaS (Infrastructure as a Service).
-
-
SaaS (Software as a Service)
a cloud computing service provider controls everything for you - including servers and storage, networking firewalls/security, data center buildings, development tools, database management, business analytics, operating systems, and hosted applications.
Compared to IaaS (Infrastructure as a Service) and PaaS (Platform as a Service), this offers you the least access.
-
-
S3 Buckets
containers that are used to store your data in Amazon S3. You must create one of these before you upload anything to S3. When you upload data to s3, you are uploading that data to a specific “bucket”.
-
Trusted Access
gives you the ability to allow an AWS trusted service to perform tasks within your organization. This allows centralized security management of AWS accounts.
-
Workload
the target of what you are auditing, which might consist of a subset of resources in a single AWS account or be a collection of multiple resources spanning multiple AWS accounts. A small business might have only a few workloads while a large enterprise
might have thousands.