Mastering AWS IAM: Using Automation to Secure Access to AWS

January 23rd, 2017   |     |  product & technology

For many companies, Amazon Web Services is the foundation of their software apps, containing software code and data that are critical to protect. AWS offers incredible identity and access management (IAM) tools, yet companies have challenges securing and automating AWS access in a way that is aligned with their business needs.

Companies struggle to balance productivity with security when it comes to configuring and managing access to their AWS environments. A new study we have recently conducted reveals that approximately 75% of AWS customers don’t use granular AWS privileges. This translates to insufficient privileges which many AWS users need to be productive on AWS as well as overly strong privileges that could put their organization’s resources at risk.

The key to harnessing the power of AWS IAM is by learning how to extend AWS access into the organization. One way to do this is to integrate it with the employee lifecycle to enable a kill switch for departed employees. We look to educate companies on how to implement AWS access by better using best practices and implementation samples.

We are offering a free, one-hour webinar titled “Mastering AWS IAM: Using Automation to Secure Access to AWS.” Featuring product team members and security experts Jonathan Bennun and Nathan Chan of OneLogin and Scott Ward of Amazon Web Services, the webinar will discuss mistakes to avoid when using AWS Identity and Access Management (IAM) and how to address them.

The interactive webinar will cover best practices for AWS access security, how to extend AWS IAM security, as well as provide a demo of how to set-up a secure OneLogin and AWS deployment. The online seminar will also give Instruction on how to get a free OneLogin for AWS account and share an overview of available resources, from templates to white papers.

By registering for this webinar, attendees will learn:

  • AWS IAM configuration pitfalls
  • Best practices for AWS access security
  • How to extend AWS IAM security using SAML integration, Multi-Factor Authentication, and AWS Roles
  • Demo of how to setup a secure OneLogin+AWS deployment

Click here to register now.

About the Author

Jack Shepherd joined the OneLogin team in Summer of 2015, and is now the Content Marketing Lead at OneLogin. Jack specializes in producing thought leadership pieces around the latest cloud technologies, cybersecurity, and the evolving role of unified access management.

View all posts by Jack Shepherd

About the Author

Jack Shepherd joined the OneLogin team in Summer of 2015, and is now the Content Marketing Lead at OneLogin. Jack specializes in producing thought leadership pieces around the latest cloud technologies, cybersecurity, and the evolving role of unified access management.

View all posts by Jack Shepherd

Secure All Your Apps, Users, and Devices