Skip to content

Understanding IAM Basics

Updated: at 04:12 PMSuggest Changes

AWS Identity and Access Management (IAM) is fundamental to securing your cloud resources. This guide breaks down the essential concepts and components of IAM, helping you understand how to implement secure access controls in your AWS environment.

Core IAM Primitives

IAM is built on three fundamental building blocks that work together to provide secure access management:

PrimitiveDescriptionKey Points
UserAn identity representing an individual or system• Can be human or machine
• Has permanent long-term credentials
• Can belong to multiple groups
RoleA temporary identity with defined permissions• Used for temporary access
• No permanent credentials
• Commonly used by applications and services
PolicyA document defining permissions• Specifies allowed/denied actions
• Written in JSON
• Can be attached to users, roles, or resources

Understanding IAM Policies

Policy Types

1. Identity-based Policies

These policies are attached directly to IAM identities (users, groups, or roles) and specify what actions those identities can perform.

2. Resource-based Policies

Attached directly to resources (like S3 buckets or Lambda functions) to define who can access them and what actions they can perform.

Policy Evaluation Fundamentals

  1. Default Deny Principle

    • All access is denied by default
    • Access must be explicitly granted through policies
    • Provides a secure foundation for access control
  2. Policy Evaluation Logic

    • Multiple policies are evaluated together
    • The final permission is determined by combining all applicable policies
    • Important rule: An explicit DENY always overrides any ALLOW
  3. Wildcard Usage

    • Wildcards (*) can represent multiple characters
    • Example: s3:* represents all S3 actions
    • Use with caution as they can grant broader access than intended

Policy Structure and Syntax

Anatomy of an IAM Policy

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "s3:GetObject",
                "s3:PutObject"
            ],
            "Resource": "arn:aws:s3:::bucket-name/*"
        }
    ]
}

Key Elements Explained

ElementPurposeExample
VersionPolicy language version”2012-10-17” (current version)
StatementContainer for permission rulesArray of policy statements
EffectSpecifies allow or deny”Allow” or “Deny”
ActionAPI calls being controlled”s3:GetObject”
ResourceTarget of the permissionARN of the resource

Previous Post
IAM Users vs IAM roles - Understanding the differences
Next Post
My Journey to Becoming a Burp Suite Certified Practitioner