<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.quizz.vn/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.quizz.vn/feed.php">
        <title>Wiki.Quizz.vn - aws:security:iam</title>
        <description></description>
        <link>https://wiki.quizz.vn/</link>
        <image rdf:resource="https://wiki.quizz.vn/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-15T18:11:56+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:assume-role&amp;rev=1766904162&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:best-practices&amp;rev=1766929226&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:group&amp;rev=1766903865&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:identity-based-policy&amp;rev=1766904052&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:instance-profile&amp;rev=1766904264&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:least-privilege&amp;rev=1766904304&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:permission-boundary&amp;rev=1766904283&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:policy-evaluation&amp;rev=1766904106&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:policy&amp;rev=1766904026&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:privileged-users&amp;rev=1766929319&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:resource-based-policy&amp;rev=1766904078&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:role&amp;rev=1766903889&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:root-user-best-practices&amp;rev=1766907548&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:root-user&amp;rev=1766907508&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:sts&amp;rev=1766904140&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:trust-policy&amp;rev=1766903972&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.quizz.vn/doku.php?id=aws:security:iam:user&amp;rev=1766907826&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.quizz.vn/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Wiki.Quizz.vn</title>
        <link>https://wiki.quizz.vn/</link>
        <url>https://wiki.quizz.vn/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:assume-role&amp;rev=1766904162&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:42:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>assume-role</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:assume-role&amp;rev=1766904162&amp;do=diff</link>
        <description>AssumeRole

What it is: An STS operation where a principal “switches into” a role and receives temporary credentials.

What it’s for:

	*  Cross-account access (Account A assumes role in Account B).
	*  Service-to-service secure permission granting.</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:best-practices&amp;rev=1766929226&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T13:40:26+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>best-practices</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:best-practices&amp;rev=1766929226&amp;do=diff</link>
        <description>IAM Best Practices

What it is: Recommended security practices for managing identities and permissions in AWS.

What it’s for:

	*  Reduce risk of account compromise.
	*  Improve auditing and accountability.
	*  Enforce least privilege.

Top exam best practices:</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:group&amp;rev=1766903865&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:37:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>group</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:group&amp;rev=1766903865&amp;do=diff</link>
        <description>IAM Group

What it is: A collection of IAM users.

What it’s for:

	*  Attach policies once to the group; all users inherit the group permissions.
	*  Make permission management simpler and consistent.

Key ideas:

	*  Groups contain users only (not roles).</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:identity-based-policy&amp;rev=1766904052&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:40:52+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>identity-based-policy</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:identity-based-policy&amp;rev=1766904052&amp;do=diff</link>
        <description>Identity-based Policy

What it is: A policy attached to an IAM user, group, or role.

What it’s for:

	*  Grant that identity permissions to call AWS APIs.

Key ideas:

	*  Most common in AWS.
	*  Best practice: attach to roles for services.

Hard words:</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:instance-profile&amp;rev=1766904264&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:44:24+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>instance-profile</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:instance-profile&amp;rev=1766904264&amp;do=diff</link>
        <description>Instance Profile (EC2)

What it is: A container that attaches an IAM Role to an EC2 instance.

What it’s for:

	*  Let EC2 get temporary credentials automatically (no access keys on disk).
	*  Enable EC2 to call AWS services like S3/DynamoDB/SSM.</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:least-privilege&amp;rev=1766904304&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:45:04+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>least-privilege</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:least-privilege&amp;rev=1766904304&amp;do=diff</link>
        <description>Least Privilege

What it is: Security principle: grant only the permissions needed for the task—nothing more.

What it’s for:

	*  Reduce damage if credentials are compromised.
	*  Improve security posture.

How to apply:

	*  Scope by action (read vs write).</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:permission-boundary&amp;rev=1766904283&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:44:43+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>permission-boundary</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:permission-boundary&amp;rev=1766904283&amp;do=diff</link>
        <description>Permission Boundary

What it is: A policy that sets the maximum permissions an IAM role/user can have.

What it’s for:

	*  Delegate IAM creation safely (e.g., allow a team to create roles but not exceed a boundary).
	*  Prevent privilege escalation.</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:policy-evaluation&amp;rev=1766904106&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:41:46+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>policy-evaluation</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:policy-evaluation&amp;rev=1766904106&amp;do=diff</link>
        <description>Policy Evaluation (Allow/Deny logic)

What it is: The rules AWS uses to decide whether a request is allowed.

What it’s for: Predict and troubleshoot access problems.

Decision rules (high-level):

	*  Default is implicit deny (không ghi Allow thì coi như không được).</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:policy&amp;rev=1766904026&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:40:26+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>policy</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:policy&amp;rev=1766904026&amp;do=diff</link>
        <description>IAM Policy

What it is: A JSON document that defines permissions.

What it’s for:

	*  Control access by specifying Actions, Resources, and optional Conditions.

Core structure (conceptual):

	*  Effect: Allow or Deny
	*  Action: what API actions are permitted (e.g., s3:GetObject)</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:privileged-users&amp;rev=1766929319&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T13:41:59+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>privileged-users</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:privileged-users&amp;rev=1766929319&amp;do=diff</link>
        <description>Privileged Users

What it is: Users/roles with high permissions (admin, ability to create policies, manage keys, change security settings).

What it’s for:

	*  Identify high-risk identities that must be protected strongly.

Best practice:

	*  Require</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:resource-based-policy&amp;rev=1766904078&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:41:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>resource-based-policy</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:resource-based-policy&amp;rev=1766904078&amp;do=diff</link>
        <description>Resource-based Policy

What it is: A policy attached directly to a resource (e.g., S3 bucket policy, KMS key policy).

What it’s for:

	*  Grant permissions to principals (users/roles/accounts) on that resource.
	*  Enable cross-account access without needing identity policy in the resource owner account (often combined).</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:role&amp;rev=1766903889&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:38:09+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>role</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:role&amp;rev=1766903889&amp;do=diff</link>
        <description>IAM Role

What it is: An AWS identity with permissions that can be assumed temporarily.

What it’s for:

	*  Give permissions to AWS services (EC2, Lambda, ECS, EKS) securely.
	*  Enable cross-account access without sharing long-term keys.
	*  Use temporary credentials from</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:root-user-best-practices&amp;rev=1766907548&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T07:39:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>root-user-best-practices</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:root-user-best-practices&amp;rev=1766907548&amp;do=diff</link>
        <description>Root User Best Practices

What it is: The recommended security steps for protecting the AWS account root user.

What it’s for:

	*  Reduce the chance of account takeover.
	*  Ensure only authorized people can perform sensitive account-level actions.</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:root-user&amp;rev=1766907508&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T07:38:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>root-user</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:root-user&amp;rev=1766907508&amp;do=diff</link>
        <description>AWS Account Root User

What it is: The special identity created when you first create an AWS account. It has full, unrestricted permissions in the account.

What it’s for:

	*  Perform a few account-level tasks that only the root user can do (rare use).</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:sts&amp;rev=1766904140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:42:20+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sts</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:sts&amp;rev=1766904140&amp;do=diff</link>
        <description>STS (Security Token Service)

What it is: Service that issues temporary security credentials.

What it’s for:

	*  Let users/services assume roles and get temporary access.
	*  Enable federation (login via external identity providers).
	*  Support cross-account access.</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:trust-policy&amp;rev=1766903972&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T06:39:32+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>trust-policy</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:trust-policy&amp;rev=1766903972&amp;do=diff</link>
        <description>Trust Policy

What it is: A role policy that defines who/what can assume the role.

What it’s for:

	*  Control which principal (user/role/service) can call AssumeRole.

Key ideas:

	*  Trust policy is a kind of resource-based policy attached to the role itself.</description>
    </item>
    <item rdf:about="https://wiki.quizz.vn/doku.php?id=aws:security:iam:user&amp;rev=1766907826&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-28T07:43:46+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>user</title>
        <link>https://wiki.quizz.vn/doku.php?id=aws:security:iam:user&amp;rev=1766907826&amp;do=diff</link>
        <description>IAM User

What it is: An identity for a person or an application that needs direct AWS access.

What it’s for:

	*  Console login (username/password).
	*  Programmatic access via access key (only when necessary).

Key ideas:

	*  Users can have:
		*</description>
    </item>
</rdf:RDF>
