Logo
Sign in
Product Logo
AWS Identity and Access ManagementAmazon Web Services (AWS)

Securely manage access to services and resources

Vendor

Vendor

Amazon Web Services (AWS)

Product details

Securely manage identities and access to AWS services and resources

Why use IAM?

Use AWS Identity and Access Management (IAM) to manage and scale workload and workforce access securely supporting your agility and innovation in AWS.

Benefits of IAM

Set permission guardrails and fine-grained access

Set and manage guardrails with broad permissions, and move toward least privilege by using fine-grained access controls for your workloads.

Manage workload and workforce identities across your AWS accounts

Manage identities across single AWS accounts or centrally connect identities to multiple AWS accounts.

Use temporary security credentials and permission sets to access your AWS resources

Grant temporary security credentials for workloads that access your AWS resources using IAM and grant your workforce access with AWS IAM Identity Center.

Analyze access and validate IAM policies as you move toward least privilege

Generate least-privilege policies, verify external and unused access to resources, and continually analyze to rightsize permissions.

Use cases

Apply fine-grained permissions and scale with attribute-based access control

Create granular permissions based on user attributes—such as department, job role, and team name—by using attribute-based access control.

Manage per-account access or scale access across AWS accounts and applications

Manage per-account identities with IAM or use IAM Identity Center to provide multi-account access and application assignments across AWS.

Establish organization-wide and preventative guardrails on AWS

Use service control policies to establish permissions guardrails for IAM users and roles, and implement a data perimeter around your accounts in AWS Organizations.

Set, verify, and right-size permissions toward least privilege

Streamline permissions management and use cross-account findings as you set, verify, and refine policies on the journey toward least privilege.

Find more products by category
Security SoftwareView all