TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES

Main Article Content

Dhimas Dirgantara
Is Mardianto

Abstract

In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given.

 

Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.

Article Details

Section
Articles

References

Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You

Work and Collaborate Online. Indianapolis: QUE, 2008.

P. M. Mell and T. Grance, “The NIST definition of cloud computing,” Gaithersburg, MD,

J. Wu, Z. Lei, S. Chen, and W. Shen, “An access control model for preventing virtual

machine escape attack,” Futur. Internet, vol. 9, no. 2, 2017.

D. Kim and M. G.Solomon, Fundamentals of Information Systems Security - 5th Edition,

th Editio. Canada: Jones & Bartlett Learning, 2010.

P. Case and K. V Chaudhari, “A Survey on Secure Access Control Mechanism of

Geospatial Data,” vol. 2, no. 2, pp. 188–194, 2014.

S. Osborn, R. Sandhu, and Q. Munawer, “Configuring Role-Based Access Control to

Enforce Mandatory and Discretionary Access Control Policies,” vol. 2, no. 2, pp. 85–106,

A. P. S. A. Ubale and S. S. Apte, “Comparison of ACL Based Security Models for

securing resources for Windows operating system,” pp. 63–64, 2014.

“IAM Product Details - Amazon Web Services (AWS).” [Online]. Available:

https://aws.amazon.com/iam/details/. [Accessed: 20-Mar-2018].

A. W. Services, “AWS Identity and Access Management User Guide.”

“Amazon EC2.” [Online]. Available: https://aws.amazon.com/ec2/. [Accessed: 20-Mar-

.

“Amazon Relational Database Service (RDS) – AWS.” [Online]. Available:

https://aws.amazon.com/rds/?nc2=h_m1. [Accessed: 20-Mar-2018].

“Cloud Object Storage | Store & Retrieve Data Anywhere | Amazon Simple Storage

Service.” [Online]. Available: https://aws.amazon.com/s3/?nc2=h_m1. [Accessed: 09-Jul-

.