0% found this document useful (0 votes)
37 views2 pages

AWS Assignment3 Instruction

This document provides step-by-step instructions for creating an IAM user in AWS, assigning them to a group, and granting full access to the S3 service. It includes prerequisites, detailed steps for user creation, group assignment, and testing permissions. Additionally, it emphasizes security best practices such as using the Principle of Least Privilege and enabling Multi-Factor Authentication.

Uploaded by

rahulbhuiya718
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views2 pages

AWS Assignment3 Instruction

This document provides step-by-step instructions for creating an IAM user in AWS, assigning them to a group, and granting full access to the S3 service. It includes prerequisites, detailed steps for user creation, group assignment, and testing permissions. Additionally, it emphasizes security best practices such as using the Principle of Least Privilege and enabling Multi-Factor Authentication.

Uploaded by

rahulbhuiya718
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Assignment-3

Instruction Steps for Creating an IAM User and Granting Full S3 Access

Objective

Learn how to create an IAM user in AWS, assign permissions through a group, and grant full
access to the S3 service.

Prerequisites

1. AWS Management Console access.


2. Permissions to create IAM users and groups in your AWS account.

Step-by-Step Instructions

A. Creating an IAM User

1. Sign In: Log in to the AWS Management Console and open the IAM Console.
2. Navigate to Users:
o In the left-hand navigation pane, select Users.
o Click Add user.
3. Add User Details:
o Enter the user name (e.g., U1).
o Select Access Type as AWS Management Console access.
4. Set Password:
o Choose one:
 Auto-generated password (AWS generates a random password).
 Custom password (you define the password).
o For this exercise, enter a custom password.
o Uncheck Require password reset.
o Click Next.
5. Assign Permissions:
o You can assign permissions in three ways. For now, skip this step and assign
permissions later.
6. Review:
o On the Review page, confirm the entered details.
o Click Create user.
7. Download Credentials:
o Download the .csv file containing the credentials (username and password).
o Save it securely.

B. Creating a Group and Assigning Permissions


1. Navigate to Groups:
o In the IAM Console, navigate to User Groups.
o Click Create group.
2. Define Group Details:
o Enter a group name (e.g., g1).
o In the Permissions Policies, search for S3.
o Select the policies for Full Access to S3 (e.g., AmazonS3FullAccess).
3. Add User to the Group:
o After creating the group, go to Users.
o Select the newly created user (e.g., U1).
o Under the Groups tab, click Add user to groups.
o Choose the group (e.g., g1) and add the user.
4. Verify:
o Navigate back to the user details.
o Ensure the user is listed under the group with appropriate permissions.

C. Log In with the New IAM User

1. Access AWS Console:


o Use the credentials saved in the .csv file.
o Log in to the AWS console as the IAM user.
2. Test Permissions:
o Navigate to the S3 Console.
o Verify that the IAM user has full access by creating or managing S3 buckets
and objects.

Expected Outcome

By following these steps:

 An IAM user with secure login credentials is created.


 Permissions to access S3 services are granted via a group.
 The user can log in and perform operations in S3 as intended.

Remarks

 Security Best Practice: Use the Principle of Least Privilege to grant only necessary
permissions.
 Password Policy: Enforce a strong password policy for better security.
 Multi-Factor Authentication (MFA): Consider enabling MFA for the IAM user for
enhanced security.
 Audit Regularly: Periodically review and update user permissions to align with
security requirements.

You might also like