...
Session 2 – AWS Security - Intermediate & Advanced Topics
Time | Topic | Details |
---|---|---|
9:00 | Welcome & Introduction | |
9:00-9:30 | IAM and Identity best practices on AWS | |
9:30-9:40 | IAM permission boundary demo | |
9:40-10:00 | IAM permissions boundary lab | https://d29727063o6tf9.cloudfront.net/permissionboundary.html |
10:00-10:25 | CloudTrail | |
10:25-10:30 | CloudTrail demo | |
10:30-10:45 | CloudTrail at Cornell | |
10:45-11:00 | CloudTrail lab | https://workshop.aws-management.tools/cloudtrail/athena/ |
11:00-11:15 | Break | |
11:15-11:45 | Config Service | |
11:45-12:05 | Cornell Config Service lab | AWS Config - Hands-on Exercise |
12:05-12:35 | IAM Access Analyzer | |
12:35-1:00 | Cornell Access Analyzer lab | AWS Access Analyzer - Hands-on Exercise |
(Optional) 1:00-1:30 | Optional Q&A |
Session 2 Resources
- Presentation: TBD
- Materials
Permissions Boundaries: https://d29727063o6tf9.cloudfront.net/permissionboundary.html
- CloudTrail Lab: https://workshop.aws-management.tools/cloudtrail/athena/
- Config hands-on: AWS Config - Hands-on Exercise
- Access Analyzer hands-on: AWS Access Analyzer - Hands-on Exercise
- References
...