Identity Access Management CheatSheet

  • ldentity Access Management is used to manage access to users and resources
  • IAM is a universal system. (applied to all regions at the same time). JAM is a free service
  • A root account is the account initially created when AWS is set up (full administrator)
  • New IAM accounts have no permissions by default until granted
  • New users get assigned an Access Key ld and Secret when first created when you give them programmatic access
  • Access Keys are only used for CLI and SDK (cannot access console)
  • Access keys are only shown once when created. If lost they must be deleted/recreated again.
  • Always setup MFA for Root Accounts
  • Users must enable MFA on their own, Administrator cannot turn it on for each user
  • IAM allows your set password policies to set minimum password requirements or rotate passwords
  • IAM Identities as Users, Groups, and Roles
  • IAM Users End users who log into the console or interact with AWS resources programmatically
  • IAM Groups Group up your Users so they all share permission levels of the group. eg. Administrators, Developers, Auditors
  • IAM Roles Associate permissions to a Role and then assign this to an Users or Groups
  • **IAM Policies JSON documents which grant permissions for a specific user, group, or role to access services.
  • IAM Policies are attached to to lAM Identities
  • Managed Policies are policies provided by AWS and cannot be edited
  • Customer Managed Policies are policies created by use the customer, which you can edit
  • Inline Policies are policies-which are directly attached to a user

[[IAM_CheatSHeet]]