An organization has setup multiple IAM users. The organization wants that each IAM user
accesses the IAM console only within the organization and not from outside. How can it achieve
this?
A.
Create an IAM policy with the security group and use that security group for AWS console login
B.
Create an IAM policy with a condition which denies access when the IP address range is not
from the
organization
C.
Configure the EC2 instance security group which allows traffic only from the organization’s IP
range
D.
Create an IAM policy with VPC and allow a secure gateway between the organization and AWS
Console
Explanation:
AWS Identity and Access Management is a web service which allows organizations to manage
users and user permissions for various AWS services. The user can add conditions as a part of
the IAM policies. The condition can be set on AWS Tags, Time, and Client IP as well as on many
other parameters. If the organization wants the user to access only from a specific IP range, they
should set an IAM policy condition which denies access when the IP is not in a certain range. E.g.
The sample policy given below denies all traffic when the IP is not in a certain range.
“Statement”: [{
“Effect”: “Deny”,
“Action”: “*”,
“Resource”: “*”,
“Condition”: {
“NotIpAddress”: {
“aws:SourceIp”: [“10.10.10.0/24”, “20.20.30.0/24”]
}}
}]
B
B