Tag Archives: IAM

Amazon S3 Security In-Depth Part 3: IAM Identities

This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading

Amazon S3 Security In-Depth Part 2: Basics of IAM Policies

This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In this Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading

Amazon S3 Security In-Depth Part 1: ACLs vs Bucket Policies vs IAM

To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading

Two-Factor Authentication: Solutions, Methods, Best Practices

With new data breaches being uncovered daily, many companies are desperate to improve security for their clients. The old standard of a user login and password is no longer considered very safe. 2FA is a security by-word nowadays. So, why do you still using old log-on techniques?  

Continue reading

Managing IAM Permissions in the Cloud: AWS vs Microsoft Azure vs Google Cloud

All of the major public clouds offer identity and access management (IAM) tools. The exact nature of the various cloud IAM tools varies, however. So do their names. This article clarifies that issue by comparing the identity and access management tools and frameworks associated with each of the three major public clouds -- AWS, Azure, and Google. Continue reading

Two Step Protection against Data Breach

Two Step Protection Against Data Breach

By using cloud storage, in today’s world, we need to make additional efforts in keeping the data protected. If you create a cloud-based folder with the same sharing practices, hackers and industrial spies can access it, even if you do not show the URL on the Internet.

In this article, you will learn about some recent data leaks and how to keep your sensitive data safe by implementing encryption and IAM policy best practices.
Continue reading

AWS Security Best Practices: Checklist

AWS Security Best Practices ChecklistAmazon Web Services ensure data security of in compliance with the so-called Shared Responsibility model. It is based on the following assumption: AWS does such operations like decommissioning of old storage devices in accordance to the latest industry standards and controls physical access to data centers, and the user takes care of securing his root credentials, assigns security groups, edits access control list policies and performs identity management. Therefore, the user takes full responsibility for any security breach on his/her side.

Use this checklist to find out if your account is in compliance with AWS security best practices to protect crucial data and ensure stable work for your resources.
Continue reading

Amazon IAM Roles Support in CloudBerry Products

This article refers to CloudBerry Explorer 4.0.8, CloudBerry Drive 1.4.3 and later.

Here in CloudBerry, we improve our products to help you build a more reliable, effective and secure environment. So here's the news for Amazon storage users:

The option is already available with CloudBerry Explorer and CloudBerry Drive.

Continue reading

CloudBerry Backup with AWS IAM Users for Amazon Glacier

CloudBerry Backup and CloudBerry Explorer provide users with an ability to leverage Amazon Identity and Access Management (IAM) service that allows to create multiple users for one AWS account and specify access rights for each user.
Below is a brief guide on how to:

  • Use CloudBerry Explorer to configure multiple users with limited access to Amazon Glacier account
  • Generate individual Access and Secret Keys for each user in CloudBerry Explorer
  • Сonfigure CloudBerry Backup to use AWS IAM user account.

Continue reading

CloudBerry Backup with AWS IAM Users

CloudBerry Backup and CloudBerry Explorer provide users with an ability to leverage the Amazon Identity and Access Management (IAM) service that allows you to create multiple users for one AWS account and specify access rights for each user or the set of users. Continue reading