Mastering AWS IAM: A Guided Lab Exploration
Mastering AWS IAM: A Guided Lab Exploration
This lab provides a hands-on exploration of AWS Identity and Access Management (IAM), focusing on users, groups, and policies. We'll walk through a practical scenario, adding users to groups and verifying their inherited permissions. By the end, you'll understand how to manage user access and secure your AWS resources effectively.
Task 1: Exploring Pre-created IAM Users, Groups, and Policies
This section involves examining pre-configured IAM users and groups to understand their default settings and associated policies. We will analyze the permissions granted to these entities, forming a foundation for subsequent tasks.
Exploring Users
Three users—user-1
, user-2
, and user-3
—were pre-created for this lab. Let's investigate user-1
:
- Zero Permissions Policies: Initially,
user-1
lacks any explicit permissions policies. This means they cannot access any AWS services until added to a group or assigned specific policies. - No Group Membership:
user-1
is not a member of any groups, further reinforcing their lack of initial permissions. - Console Password Assigned: A console password is assigned, allowing access to the AWS Management Console. However, without additional policies, this access is limited.




Exploring Groups
Three groups exist: EC2-Admin
, EC2-Support
, and S3-Support
. Let's examine EC2-Support
:
- Managed Policy: The group utilizes the
AmazonEC2ReadOnlyAccess
managed policy. - Policy JSON: This policy, defined in JSON, grants read-only access to Amazon EC2, Elastic Load Balancing, EC2 Auto Scaling, and CloudWatch. It's ideal for support roles.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:Describe*",
"ec2:GetSecurityGroupsForVpc"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "elasticloadbalancing:Describe*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"cloudwatch:ListMetrics",
"cloudwatch:GetMetricStatistics",
"cloudwatch:Describe*"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "autoscaling:Describe*",
"Resource": "*"
}
]
}


The S3-Support
group similarly uses the AmazonS3ReadOnlyAccess
policy, granting read-only access to S3 buckets.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:Get*",
"s3:List*",
"s3:Describe*",
"s3-object-lambda:Get*",
"s3-object-lambda:List*"
],
"Resource": "*"
}
]
}

The EC2-Admin
group has the EC2-Admin-Policy
, allowing description, starting, and stopping of EC2 instances (with limitations based on instance type).
{
"Version": "2012-10-17",
"Statement": [
{
"Condition": {
"ForAllValues:StringLikeIfExists": {
"ec2:InstanceType": [
"*.nano",
"*.micro"
]
}
},
"Action": [
"ec2:Describe*",
"ec2:StartInstances",
"ec2:StopInstances"
],
"Resource": [
"*"
],
"Effect": "Allow"
}
]
}

Task 2: Adding Users to Groups - A Real-World Scenario
This section simulates a real-world scenario where new employees are assigned roles based on their job functions. We'll add users to the appropriate groups, granting them the necessary permissions.

Adding user-1
to S3-Support
user-1
, newly hired S3 support, needs read-only access to S3. Adding them to the S3-Support
group achieves this.



Adding user-2
to EC2-Support
Similarly, user-2
(EC2 support) is added to the EC2-Support
group.



Adding user-3
to EC2-Admin
Finally, user-3
, the EC2 administrator, is added to the EC2-Admin
group.




Task 3: Testing User Permissions
Now, let's test the permissions of each user by signing in using their credentials and accessing various AWS services. This practical exercise validates the effectiveness of the IAM configuration.
Signing in as user-1
After signing in with user-1
's credentials using the provided sign-in URL, we can observe their access:
- S3 Access:
user-1
can view S3 buckets, confirming the read-only access granted via theS3-Support
group. - EC2 Access Denied: Attempts to access EC2 services result in an "Access Denied" error, correctly reflecting the lack of EC2 permissions.





Signing in as user-2
Similar steps are followed for user-2
. The results highlight their read-only EC2 access and lack of S3 access.






Signing in as user-3
Finally, testing user-3
demonstrates their ability to manage EC2 instances, including starting and stopping them, as expected from their administrative role.





Conclusion
This lab demonstrated the fundamental concepts of IAM user management and policy-based access control. By understanding how to create users, groups, and policies, and by testing the resulting permissions, you can effectively secure your AWS environment and maintain granular control over access to your resources.
Related Articles
Software Development
Unveiling the Haiku License: A Fair Code Revolution
Dive into the innovative Haiku License, a game-changer in open-source licensing that balances open access with fair compensation for developers. Learn about its features, challenges, and potential to reshape the software development landscape. Explore now!
Read MoreSoftware Development
Leetcode - 1. Two Sum
Master LeetCode's Two Sum problem! Learn two efficient JavaScript solutions: the optimal hash map approach and a practical two-pointer technique. Improve your coding skills today!
Read MoreBusiness, Software Development
The Future of Digital Credentials in 2025: Trends, Challenges, and Opportunities
Digital credentials are transforming industries in 2025! Learn about blockchain's role, industry adoption trends, privacy enhancements, and the challenges and opportunities shaping this exciting field. Discover how AI and emerging technologies are revolutionizing identity verification and workforce management. Explore the future of digital credentials today!
Read MoreSoftware Development
Unlocking the Secrets of AWS Pricing: A Comprehensive Guide
Master AWS pricing with this comprehensive guide! Learn about various pricing models, key cost factors, and practical tips for optimizing your cloud spending. Unlock significant savings and efficiently manage your AWS infrastructure.
Read MoreSoftware Development
Exploring the GNU Verbatim Copying License
Dive into the GNU Verbatim Copying License (GVCL): Understand its strengths, weaknesses, and impact on open-source collaboration. Explore its unique approach to code integrity and its relevance in today's software development landscape. Learn more!
Read MoreSoftware Development
Unveiling the FSF Unlimited License: A Fairer Future for Open Source?
Explore the FSF Unlimited License: a groundbreaking open-source license designed to balance free software distribution with fair developer compensation. Learn about its origins, strengths, limitations, and real-world impact. Discover how it addresses the challenges of open-source sustainability and innovation.
Read MoreSoftware Development
Conquer JavaScript in 2025: A Comprehensive Learning Roadmap
Master JavaScript in 2025! This comprehensive roadmap guides you through fundamental concepts, modern frameworks like React, and essential tools. Level up your skills and build amazing web applications – start learning today!
Read MoreBusiness, Software Development
Building a Successful Online Gambling Website: A Comprehensive Guide
Learn how to build a successful online gambling website. This comprehensive guide covers key considerations, technical steps, essential tools, and best practices for creating a secure and engaging platform. Start building your online gambling empire today!
Read MoreAI, Software Development
Generate Images with Google's Gemini API: A Node.js Application
Learn how to build an AI-powered image generator using Google's Gemini API and Node.js. This comprehensive guide covers setup, API integration, and best practices for creating a robust image generation service. Start building today!
Read MoreSoftware Development
Discover Ocak.co: Your Premier Online Forum
Explore Ocak.co, a vibrant online forum connecting people through shared interests. Engage in discussions, share ideas, and find answers. Join the conversation today!
Read MoreSoftware Development
Mastering URL Functions in Presto/Athena
Unlock the power of Presto/Athena's URL functions! Learn how to extract hostnames, parameters, paths, and more from URLs for efficient data analysis. Master these essential functions for web data processing today!
Read MoreSoftware Development
Introducing URL Opener: Open Multiple URLs Simultaneously
Tired of opening multiple URLs one by one? URL Opener lets you open dozens of links simultaneously with one click. Boost your productivity for SEO, web development, research, and more! Try it now!
Read More
Software Development, Business
Unlocking the Power of AWS: A Deep Dive into Amazon Web Services
Dive deep into Amazon Web Services (AWS)! This comprehensive guide explores key features, benefits, and use cases, empowering businesses of all sizes to leverage cloud computing effectively. Learn about scalability, cost-effectiveness, and global infrastructure. Start your AWS journey today!
Read MoreSoftware Development
Understanding DNS in Kubernetes with CoreDNS
Master CoreDNS in Kubernetes: This guide unravels the complexities of CoreDNS, Kubernetes's default DNS server, covering configuration, troubleshooting, and optimization for seamless cluster performance. Learn best practices and avoid common pitfalls!
Read MoreSoftware Development
EUPL 1.1: A Comprehensive Guide to Fair Open Source Licensing
Dive into the EUPL 1.1 open-source license: understand its strengths, challenges, and real-world applications for fair code. Learn how it balances freedom and developer protection. Explore now!
Read MoreSoftware Development
Erlang Public License 1.1: Open Source Protection Deep Dive
Dive deep into the Erlang Public License 1.1 (EPL 1.1), a crucial open-source license balancing collaboration and contributor protection. Learn about its strengths, challenges, and implications for developers and legal teams.
Read MoreSoftware Development
Unlocking Kerala's IT Job Market: Your Path to Data Science Success
Launch your data science career in Kerala's booming IT sector! Learn the in-demand skills to land high-paying jobs. Discover top data science courses & career paths. Enroll today!
Read More
Software Development
Automation in Software Testing: A Productivity Booster
Supercharge your software testing with automation! Learn how to boost productivity, efficiency, and accuracy using automation tools and best practices. Discover real-world examples and get started today!
Read MoreSoftware Development
Mastering Anagram Grouping in JavaScript
Master efficient anagram grouping in JavaScript! Learn two proven methods: sorting and character counting. Optimize your code for speed and explore key JavaScript concepts like charCodeAt(). Improve your algorithms today!
Read More
Software Development
Mastering Kubernetes Deployments: Rolling Updates and Scaling
Master Kubernetes Deployments for seamless updates & scaling. Learn rolling updates, autoscaling, and best practices for high availability and efficient resource use. Improve your application management today!
Read More