IAM
Identity and Access Management
Concepts
- Users
 - Groups - Can be used to organize users and their permissions
 - Roles - Used for AWS resources to authenticate with each other. Access/Secret Keys should never be used by AWS resources.
 - Policies - JSON Document describing what resources can be accessed and in what capacity
 
Facts
- Global not regional
 - Users have no permissions when created
 - Root account is the account used when creating the organization, it should be secured and then not used