IAM Role Revoking and Permissions Boundary

Offered By
Coursera Project Network
In this Guided Project, you will:

Obtain the temporary credentials generated by Role (STS)

Revoke active sessions of IAM Role

Create IAM User with Permissions Boundary

Clock2 hours
IntermediateIntermediate
CloudNo download needed
VideoSplit-screen video
Comment DotsEnglish
LaptopDesktop only

By the end of this Project, you will be able to learn how and when to revoke an IAM Role. In this scenario, we are going to deal with a real time example. Suppose, you are working as a security analyst with a global organization called "XYZ". You assigned an IAM role to an EC2 instance and the temporary credentials generated by the role assumption got leaked to a third party. Lets see how can we deal with this situation in an ideal way. This project also reviews the functionality provided by Permission Boundaries and looks at a common use case permission delegation. After completing this Project, you will get a detailed idea of Role Revoking and Permission Boundary.

Skills you will develop

  • Confidentiality
  • Cloud Computing Security
  • Tailored Access Operations
  • Identity Management (IDM)
  • Access Control

Learn step-by-step

In a video that plays in a split-screen with your work area, your instructor will walk you through these steps:

  1. Create the Project environment

  2. Obtain the temporary credentilas generated by STS, when assuming an IAM Role

  3. Role Revoking

  4. IAM Permissions Boundary

  5. Cleaning the Project Environment

How Guided Projects work

Your workspace is a cloud desktop right in your browser, no download required

In a split-screen video, your instructor guides you step-by-step

Frequently asked questions

Frequently Asked Questions

More questions? Visit the Learner Help Center.