TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES
Main Article Content
Abstract
In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given.
Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.
Article Details
This work is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.
References
Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You
Work and Collaborate Online. Indianapolis: QUE, 2008.
P. M. Mell and T. Grance, “The NIST definition of cloud computing,” Gaithersburg, MD,
J. Wu, Z. Lei, S. Chen, and W. Shen, “An access control model for preventing virtual
machine escape attack,” Futur. Internet, vol. 9, no. 2, 2017.
D. Kim and M. G.Solomon, Fundamentals of Information Systems Security - 5th Edition,
th Editio. Canada: Jones & Bartlett Learning, 2010.
P. Case and K. V Chaudhari, “A Survey on Secure Access Control Mechanism of
Geospatial Data,” vol. 2, no. 2, pp. 188–194, 2014.
S. Osborn, R. Sandhu, and Q. Munawer, “Configuring Role-Based Access Control to
Enforce Mandatory and Discretionary Access Control Policies,” vol. 2, no. 2, pp. 85–106,
A. P. S. A. Ubale and S. S. Apte, “Comparison of ACL Based Security Models for
securing resources for Windows operating system,” pp. 63–64, 2014.
“IAM Product Details - Amazon Web Services (AWS).” [Online]. Available:
https://aws.amazon.com/iam/details/. [Accessed: 20-Mar-2018].
A. W. Services, “AWS Identity and Access Management User Guide.”
“Amazon EC2.” [Online]. Available: https://aws.amazon.com/ec2/. [Accessed: 20-Mar-
.
“Amazon Relational Database Service (RDS) – AWS.” [Online]. Available:
https://aws.amazon.com/rds/?nc2=h_m1. [Accessed: 20-Mar-2018].
“Cloud Object Storage | Store & Retrieve Data Anywhere | Amazon Simple Storage
Service.” [Online]. Available: https://aws.amazon.com/s3/?nc2=h_m1. [Accessed: 09-Jul-
.