This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading
Tag: Amazon IAM
This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In this Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading
To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading
With new data breaches being uncovered daily, many companies are desperate to improve security for their clients. The old standard of a user login and password is no longer considered very safe. 2FA is a security by-word nowadays. So, why do you still using old log-on techniques?
All of the major public clouds offer identity and access management (IAM) tools. The exact nature of the various cloud IAM tools varies, however. So do their names. This article clarifies that issue by comparing the identity and access management tools and frameworks associated with each of the three major public clouds -- AWS, Azure, and Google. Continue reading
Amazon Web Services ensure data security of in compliance with the so-called Shared Responsibility model. It is based on the following assumption: AWS does such operations like decommissioning of old storage devices in accordance to the latest industry standards and controls physical access to data centers, and the user takes care of securing his root credentials, assigns security groups, edits access control list policies and performs identity management. Therefore, the user takes full responsibility for any security breach on his/her side.
Use this checklist to find out if your account is in compliance with AWS security best practices to protect crucial data and ensure stable work for your resources.
This article refers to CloudBerry Explorer 4.0.8, CloudBerry Drive 1.4.3 and later.
Here in CloudBerry, we improve our products to help you build a more reliable, effective and secure environment. So here's the news for Amazon storage users:
- You can run CloudBerry products on Microsoft Windows Server powered Amazon EC2 instances,
- And do it securely with Amazon Identity and Access Management (IAM) Roles.
CloudBerry Backup and CloudBerry Explorer provide users with an ability to leverage Amazon Identity and Access Management (IAM) service that allows to create multiple users for one AWS account and specify access rights for each user.
Below is a brief guide on how to:
- Use CloudBerry Explorer to configure multiple users with limited access to Amazon Glacier account
- Generate individual Access and Secret Keys for each user in CloudBerry Explorer
- Сonfigure CloudBerry Backup to use AWS IAM user account.
As always we are adding features to make it easier for our customers to use the functionality to offer the most compelling Amazon S3, CloudFront and IAM client on the Windows platform. In this blog post, we will demonstrate how to grant a user access to a specific folder in a bucket.
As always we are adding features to make it easier for our customers to use the functionality to offer the most compelling Amazon S3, CloudFront and IAM client on Windows platform.
With the newer release v2.7.5 we extending Amazon Identity Authentication Service (IAM) support and introducing an IAM Policy Wizard. The wizard allows you to create a number of users, and grant them a set of common permissions to a number of buckets and generate Login Profiles. Continue reading