Identity Access Management & S3

  • Modify the IAM users sign-in link
  • Complete the security status
    • Delete your root access keys
    • Active MFA on your root account
    • Create individual IAM users
    • Use groups to assign permissions
    • Apply an IAM password policy
  • Write the basic syntax of an ARN and the different resources
    • Individual IAM user
    • S3 object
    • DynamoDB table
    • All EC2 instances in a region
  • Create basic form of IAM policy (JSON)
  • Create and apply an IAM policy (S3)
    • Create role for EC2
    • Attach role to EC2
  • Apply an inline policy
  • Configure a permissions boundary for a user
  • Create a role
  • Create a billing alarm
  • Create a bucket
    • Upload objects
    • View the object metadata
    • Make a bucket public
    • Make an object public
    • Modify the object storage class
    • Configure encryption on an object
    • Configure encryption of a bucket
  • Configure versioning
    • Create a bucket
      • Enable versioning
      • Make bucket public
    • Upload an object
    • Review and modify permissions
    • Delete the delete marker
  • Configure a lifecycle rule
  • Create an organization
    • Add a member account
  • Share an S3 bucket across accounts using cross-account IAM roles
    • Create a bucket
    • Verify account has restricted access
  • Configure cross region replication (with an existing versioning bucket)
    • Test replication of delete markers and deletes of individual versions
  • Use the Amazon S3 Transfer Acceleration tool
  • Create a CloudFront Distribution
    • Test the configuration with the CloudFront URL
    • Perform an invalidation
    • Disable the CloudFront distribution
    • Delete the CloudFront distribution