IAM
Identity and Access Management
Concepts
- Users
- Groups - Can be used to organize users and their permissions
- Roles - Used for AWS resources to authenticate with each other. Access/Secret Keys should never be used by AWS resources.
- Policies - JSON Document describing what resources can be accessed and in what capacity
Facts
- Global not regional
- Users have no permissions when created
- Root account is the account used when creating the organization, it should be secured and then not used