|
8 | 8 |
|
9 | 9 | ### Accounts |
10 | 10 |
|
11 | | -In AWS there is a **root account,** which is the **parent container for all the accounts** for your **organization**. However, you don't need to use that account to deploy resources, you can create **other accounts to separate different AWS** infrastructures between them. |
| 11 | +In AWS, there is a **root account**, which is the **parent container for all the accounts** for your **organization**. However, you don't need to use that account to deploy resources, you can create **other accounts to separate different AWS** infrastructures between them. |
12 | 12 |
|
13 | 13 | This is very interesting from a **security** point of view, as **one account won't be able to access resources from other account** (except bridges are specifically created), so this way you can create boundaries between deployments. |
14 | 14 |
|
@@ -228,7 +228,7 @@ A boundary is just a policy attached to a user which **indicates the maximum lev |
228 | 228 |
|
229 | 229 | A session policy is a **policy set when a role is assumed** somehow. This will be like an **IAM boundary for that session**: This means that the session policy doesn't grant permissions but **restrict them to the ones indicated in the policy** (being the max permissions the ones the role has). |
230 | 230 |
|
231 | | -This is useful for **security meassures**: When an admin is going to assume a very privileged role he could restrict the permission to only the ones indicated in the session policy in case the session gets compromised. |
| 231 | +This is useful for **security measures**: When an admin is going to assume a very privileged role he could restrict the permission to only the ones indicated in the session policy in case the session gets compromised. |
232 | 232 |
|
233 | 233 | ```bash |
234 | 234 | aws sts assume-role \ |
@@ -309,20 +309,20 @@ AWS Identity and Access Management (IAM) provides **fine-grained access control* |
309 | 309 |
|
310 | 310 | In [**this page**](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-unique-ids) you can find the **IAM ID prefixe**d of keys depending on their nature: |
311 | 311 |
|
312 | | -| Identifier Code | Description | |
313 | | -| ---- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | |
314 | | -| ABIA | [AWS STS service bearer token](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_bearer.html) | |
315 | | - |
316 | | -| ACCA | Context-specific credential | |
317 | | -| AGPA | User group | |
318 | | -| AIDA | IAM user | |
319 | | -| AIPA | Amazon EC2 instance profile | |
320 | | -| AKIA | Access key | |
321 | | -| ANPA | Managed policy | |
322 | | -| ANVA | Version in a managed policy | |
323 | | -| APKA | Public key | |
324 | | -| AROA | Role | |
325 | | -| ASCA | Certificate | |
| 312 | +| Identifier Code | Description | |
| 313 | +| --------------- | ----------------------------------------------------------------------------------------------------------- | |
| 314 | +| ABIA | [AWS STS service bearer token](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_bearer.html) | |
| 315 | + |
| 316 | +| ACCA | Context-specific credential | |
| 317 | +| AGPA | User group | |
| 318 | +| AIDA | IAM user | |
| 319 | +| AIPA | Amazon EC2 instance profile | |
| 320 | +| AKIA | Access key | |
| 321 | +| ANPA | Managed policy | |
| 322 | +| ANVA | Version in a managed policy | |
| 323 | +| APKA | Public key | |
| 324 | +| AROA | Role | |
| 325 | +| ASCA | Certificate | |
326 | 326 | | ASIA | [Temporary (AWS STS) access key IDs](https://docs.aws.amazon.com/STS/latest/APIReference/API_Credentials.html) use this prefix, but are unique only in combination with the secret access key and the session token. | |
327 | 327 |
|
328 | 328 | ### Recommended permissions to audit accounts |
@@ -386,7 +386,3 @@ If you are looking for something **similar** to this but for the **browser** you |
386 | 386 | - [https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html](https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html) |
387 | 387 |
|
388 | 388 | {{#include ../../../banners/hacktricks-training.md}} |
389 | | - |
390 | | - |
391 | | - |
392 | | - |
0 commit comments