Conceptly
← All Concepts
🔐

AWS IAM

SecurityAccess and Permission Management

IAM is the permission layer that defines how people and AWS services can access resources. It combines users, roles, and policies to control what is allowed from the console, CLI, and service-to-service calls.

Architecture Diagram

🔗 Relationship

Dashed line animations indicate the flow direction of data or requests

Why do you need it?

As more teammates and automation touch AWS, reusing the same access keys everywhere makes it hard to trace who did what when something goes wrong. If you cannot narrow permissions to exactly what each service needs, one small script can expand into account-wide risk.

Why did this approach emerge?

Early on, sharing root accounts or static keys across teams was common, but this approach made tracking and revoking access difficult after incidents. This is why IAM, centered on role-based access control and temporary credentials, became the default security model.

How does it work inside?

IAM combines users, groups, roles, and policies to define permissions. People receive console and CLI access, while services assume roles to access other AWS resources with temporary credentials. In multi-account setups, IAM Identity Center can centrally manage access across accounts.

When should you use it?

Well-suited for separating team permissions, controlling service-to-service calls, assigning deployment pipeline access, designing least-privilege policies, and governing multi-account AWS access. It is not the layer that directly provides end-user sign-in flows or manages encryption keys themselves.

Least privilegeCross-account accessService-to-service authenticationTemporary credentials