IAM Interview Questions
1. What is AWS IAM?
The Amazon Web Services Identity and Access Management service is like a security guard at the door to Amazon Web Services. This is where Azure Services and its environment are authenticated and authorized.
2. What is an Identity?
An Identity is something that can be authenticated.
If you are an experienced professional checkout AWS IAM professional do checkout the part-2 wherein I have mentioned many advance-level questions.
3. Define AWS users and groups.
IAM users can be people or applications that interact with the AWS environment services and its resources. An IAM user is an identity created in AWS to access various AWS resources and services. A user has permissions associated with it. The permissions define which actions that user can perform on a specific resource.
IAM groups are collections of IAM users. Users are organized into groups so you can assign permissions in bulk rather than individually for each user. In addition, permissions are automatically inherited, making it easier to control how resources are accessed within your account. Understand it within AWS cloud Practitioner course.
4. What are the best practices you will follow while creating IAM users?
We should always create individual IAM users for each person needing access to AWS services. Even if there are many employees who require the same access, we should create individual IAM users for all of them. This increases the security posture by providing every user of IAM a unique set of credentials.
5. Explain AWS IAM Policies.
IAM Policies are how you determine who has access to what resources in your account. For example, you could allow users access to all Amazon EC2 instances within your AWS account, or just a specified instance.
6. AWS policies are of two types:
- Identity-based policies: This is the policy that binds with AWS identities, such as a users, group, or role. IAM policies are an example of that. These policies can be either Amazon Web Services managed or customer-managed.
- Resource-based policies: AWS resource-based policies are the ones that can be tied directly to Amazon Resources like a bucket policy (S3). Resource-based policies are only available for certain services.
7. What are the best practices you would follow while creating any IAM Policy?
When granting permissions, we should follow the least privileged principle. We should avoid giving users or roles more permissions than they need to accomplish their tasks by following this principle. For example, if an employee needs only access to a specific EC2 instance, specify the instance in the IAM policy. Rather than granting an employee access to every instance in your AWS account.
8. Please explain the IAM Policy Structure.
We can create IAM policies from the AWS web console and by the visual editor using the JASON-based policy editor. If you take a look into the JASON policy document it basically consists of below elements:
- Effect — Decides whether the resource is allowed or denied (Allow/Deny)
- Action — A set of service-specific parameters
- Resource — Resource names
- Condition (Optional) — Grant conditions
9. Define AWS IAM roles.
An IAM role is a temporary way to access permissions through your identity.
It’s not only the course that helps join your hands with experts and get hands-on practice over AWS Live Projects. Visit Now!
10. What is a Root user?
The Root User is the Owner Account (administrator) that is created when the AWS Account is created. By default, it has access to all AWS services and resources. It is not possible for IAM Policies to explicitly deny this user access to AWS services or resources.
11. How do you revoke access rights?
If you need to revoke access rights from an existing user, it’s simple. Simply click on Manage Permissions on his or her profile page and select Revoke Access. You’ll be presented with a list of all services to which they are granted access; check each service that is correct and then click Revoke Access in the bottom right corner.
For Free, Demo classes Call\whatsapp: +1 725 710 9949Registration Link: Click Here!
12. What is MFA in AWS IAM?
Multi-factor authentication (MFA) adds an extra layer of security for users accessing AWS resources. In addition to a username and password, an MFA-enabled user must provide a one-time code generated by an authenticator app or sent via SMS or voice call before gaining access. An MFA device can be enabled on your computer, phone, or tablet.
To learn more about AWS MFA check - Enable Multi-Factor Authentication and Secure AWS account – AWS MFA
13. Is it possible to monitor the activity of IAM users?
Yes, IAM users’ activities can be monitored. In case of a violation, you can remove the IAM user’s access.
14. What are IAM users’ access keys?
Each IAM user receives an access key along with a secret key. Users can use their access keys to authenticate themselves to Amazon Web Services when they launch an instance, run a command, or call an API. If you lose your access key, please make sure that you terminate all instances and delete any resources linked to them before creating a new one. If you lose your secret key, we recommend deleting all related resources in order to minimize potential harm.
15. What is Access control to AWS resources?
The first step in securing your resources is using access control lists (ACLs) to allow or deny access. An AWS account has an owner, so you need an access key and secret key when using ACLs with any service. Make sure you keep these keys safe! The first step in securing your resources is using access control lists (ACLs) to allow or deny access. An AWS account has an owner, so you need an access key and secret key when using ACLs with any service.
16. Which are the key features of AWS IAM?
- Access control to AWS resources
- Multi-factor authentication (MFA)
- Federated access
17. Explain best practices to manage access to AWS resources?
- Do not use root accounts – Since root accounts have access to all the AWS resources and services, it is not a good idea to share or use them.
- Use Groups – Create groups, grant access to them, and add users to them – so that all users within the group have the same access.
- Enable Multi-factor Authentication (MFA) – MFA should be enabled for privileged users such as admins. MFA adds an additional layer of security.
- Grant least privileges – Only grant permissions that are necessary for the user or group.