This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading
Tag: Amazon IAM
This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In this Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading
To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading
With new data breaches being uncovered daily, many companies are desperate to improve security for their clients. The old standard of a user login and password is no longer considered very safe. 2FA is a security by-word nowadays. So, why do you still using old log-on techniques?
All of the major public clouds offer identity and access management (IAM) tools. The exact nature of the various cloud IAM tools varies, however. So do their names. This article clarifies that issue by comparing the identity and access management tools and frameworks associated with each of the three major public clouds -- AWS, Azure, and Google. Continue reading
Amazon Web Services ensure data security of in compliance with the so-called Shared Responsibility model. It is based on the following assumption: AWS does such operations like decommissioning of old storage devices in accordance to the latest industry standards and controls physical access to data centers, and the user takes care of securing his root credentials, assigns security groups, edits access control list policies and performs identity management. Therefore, the user takes full responsibility for any security breach on his/her side.
Use this checklist to find out if your account is in compliance with AWS security best practices to protect crucial data and ensure stable work for your resources.
This article refers to CloudBerry Explorer 4.0.8, CloudBerry Drive 1.4.3 and later.
Here in CloudBerry, we improve our products to help you build a more reliable, effective and secure environment. So here's the news for Amazon storage users:
- You can run CloudBerry products on Microsoft Windows Server powered Amazon EC2 instances,
- And do it securely with Amazon Identity and Access Management (IAM) Roles.
Below is a guide on how to:
- Configure multiple users with limited access to Amazon Glacier account using CloudBerry Explorer
- Generate individual Access and Secret Keys for each user in CloudBerry Explorer
- Сonfigure CloudBerry Backup to use AWS IAM user account.
As always we are adding features to make it easier for our customers to use the functionality to offer the most compelling Amazon S3, CloudFront and IAM client on the Windows platform. In this blog post, we will demonstrate how to grant a user access to a specific folder in a bucket.
As always we are trying to stay on top of the new functionality offered by Amazon S3 to offer the most compelling Amazon S3, CloudFront and IAM client on Windows platform.
Since its release IAM Manager has been one of the most popular components of CloudBerry Explorer. To find out about IAM Manager functional overview, check out here. To learn now to create users and assign policies check out here.
Amazon CloudFront now integrates with AWS Identity and Access Management (IAM) so that you can specify which CloudFront actions a user or a group of users in your AWS Account can perform. You control user access to CloudFront by creating policies that describe user or group permissions.
With the release 2.7.2 we extended IAM Policy Designer to the Actions related to Amazon CloudFront.
Note: this post applies to CloudBerry Explorer 2.7.2 and later.
As always we would be happy to hear your feedback and you are welcome to post a comment.