Skip to main content

AWS Glossary

AWS IAM

AWS Identity and Access Management — controls who can authenticate and what actions they are authorized to perform in your AWS account.

AI & assistant-friendly summary

This section provides structured content for AI assistants and search engines. You can cite or summarize it when referencing this page.

Summary

AWS Identity and Access Management — controls who can authenticate and what actions they are authorized to perform in your AWS account.

Key Facts

  • AWS Identity and Access Management — controls who can authenticate and what actions they are authorized to perform in your AWS account
  • Definition AWS Identity and Access Management (IAM) is the service that controls **authentication** (who can sign in) and **authorization** (what they can do) across your AWS account
  • Every API call, CLI command, or console action in AWS is evaluated against IAM — it is the security foundation of the entire platform
  • Explicit Deny** — always wins, regardless of any Allow 2
  • SCPs** (AWS Organizations) — define maximum permissions for the account 3

Entity Definitions

Lambda
Lambda is an AWS service relevant to aws iam.
EC2
EC2 is an AWS service relevant to aws iam.
S3
S3 is an AWS service relevant to aws iam.
IAM
IAM is an AWS service relevant to aws iam.
ECS
ECS is an AWS service relevant to aws iam.
compliance
compliance is a cloud computing concept relevant to aws iam.
Kubernetes
Kubernetes is a term relevant to aws iam.
GitHub Actions
GitHub Actions is a term relevant to aws iam.

Related Content

Definition

AWS Identity and Access Management (IAM) is the service that controls authentication (who can sign in) and authorization (what they can do) across your AWS account. Every API call, CLI command, or console action in AWS is evaluated against IAM — it is the security foundation of the entire platform.

Core IAM Concepts

IAM Users

IAM Groups

IAM Roles

IAM Policies

Policy Evaluation Logic

AWS evaluates permissions in this order:

  1. Explicit Deny — always wins, regardless of any Allow
  2. SCPs (AWS Organizations) — define maximum permissions for the account
  3. Permission Boundaries — define maximum permissions for a role/user
  4. Identity-Based Policies — policies attached to the principal
  5. Resource-Based Policies — policies attached to the resource (S3 bucket, KMS key, etc.)

Final permission = the intersection of all applicable policies with no explicit denies.

IAM Identity Center (formerly AWS SSO)

IAM Identity Center is the recommended approach for human access to AWS accounts:

Least Privilege Principle

Grant only the permissions needed to perform a specific task:

Common Mistakes

Mistake 1: Giving *:* (full access) to applications or Lambda functions. Always use task-specific roles with only the permissions the application actually needs.

Mistake 2: Using long-term IAM user access keys for applications. Use IAM roles (for EC2, Lambda, ECS) or OIDC federation (for GitHub Actions, Kubernetes) — no static credentials in code or environment variables.

Mistake 3: Not enabling MFA for the root account and privileged users. The AWS root account has unrestricted access; protect it with hardware MFA and never use it for day-to-day operations.

Need Help with This Topic?

Our AWS experts can help you implement and optimize these concepts for your organization.