AWS Identity and Access Management (IAM) Resources
Best practices with IAM
Follow these IAM best practices to help secure your AWS resources using IAM. You can specify who can access which AWS services and resources, and under which conditions.
Documentation
References
Other resources
Sample code and libraries: IAM-related sample code
Developer tools: Command line and GUI-based tools for use with IAM APIs
IAM discussion forum: Discussion forum for IAM-related topics
Workshops
Videos
IAM policy power hour – AWS re:Inforce 2024 (51:33)
AWS re:Inforce 2022 - Security best practices with AWS IAM (IAM201)
AWS re:Inforce 2022 - How to achieve least privilege (IAM303)
Managing hybrid workloads with IAM Roles Anywhere, featuring Hertz (45:03)
Accessing AWS services from workloads running outside of AWS (43:41)
AWS re:Invent 2022 - Harness IAM policies & rein in permissions with IAM Access Analyzer (SEC313)
AWS re:Invent 2022 - Running services without access to data (SEC327)
AWS re:Invent 2022 - A day in the life of a billion requests (SEC404)
AWS re:Invent 2022 - How AWS uses math to prove security (SEC310)
Video playlists
Featured blog posts
- How to monitor and query IAM resources at scale - Part 1
- How to monitor and query IAM resources at scale - Part 2
- How to use policies to restrict where EC2 instance credentials can be used from
- How to visualize IAM Access Analyzer policy validation findings with Amazon Quicksight
- How to prioritize IAM Access Analyzer findings
- Extend AWS IAM roles to workloads outside of AWS with IAM Roles Anywhere
- How to use AWS Private Certificate Authority short-lived certificate mode
- Using AWS Distro for OpenTelemetry and IAM Roles Anywhere on-premises to ingest metrics into Amazon Managed Service for Prometheus