Challenge - 5 Problems
IAM Policy Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
❓ service_behavior
intermediate2:00remaining
What is the effect of this IAM policy snippet?
Given this IAM policy snippet, what will be the effect on the user permissions?
AWS
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Deny",
"Action": "s3:DeleteBucket",
"Resource": "arn:aws:s3:::example-bucket"
}
]
}Attempts:
2 left
💡 Hint
Look at the Effect and Action fields carefully.
✗ Incorrect
The policy explicitly denies the 's3:DeleteBucket' action on the specified bucket. Other actions are not denied.
❓ Configuration
intermediate2:00remaining
Which IAM policy allows listing all S3 buckets?
Select the IAM policy that correctly allows a user to list all S3 buckets in the account.
Attempts:
2 left
💡 Hint
The action name must be exact and the resource for listing all buckets is special.
✗ Incorrect
The correct action to list all buckets is 's3:ListAllMyBuckets' and it requires resource '*'.
❓ Architecture
advanced2:30remaining
Which IAM policy structure correctly restricts access to a specific DynamoDB table?
You want to allow a user to only read items from a DynamoDB table named 'Orders'. Which policy snippet correctly restricts access?
Attempts:
2 left
💡 Hint
Restrict the resource ARN to the exact table and limit actions to read-only.
✗ Incorrect
Option A allows only read actions on the specific 'Orders' table ARN, restricting access properly.
❓ security
advanced2:00remaining
What error occurs if an IAM policy JSON misses a comma between statements?
Consider this IAM policy JSON snippet missing a comma between two statements. What error will AWS IAM report when you try to apply it?
AWS
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::example-bucket/*"
}
]
}Attempts:
2 left
💡 Hint
JSON syntax requires commas between objects in arrays.
✗ Incorrect
The missing comma causes a JSON syntax error, so AWS IAM rejects the policy.
🧠 Conceptual
expert2:30remaining
What is the final permission effect when multiple IAM policies conflict?
A user has two IAM policies attached: one explicitly allows 'ec2:StartInstances' and another explicitly denies 'ec2:StartInstances'. What is the final permission effect when the user tries to start an EC2 instance?
Attempts:
2 left
💡 Hint
Explicit Deny always takes precedence over Allow in IAM.
✗ Incorrect
In AWS IAM, explicit Deny always overrides any Allow, regardless of policy attachment or priority.