AWS Identity and Access Management (IAM) Resources
Best practices with IAM
Follow these IAM best practices to help secure your AWS resources using IAM. You can specify who can access which AWS services and resources, and under which conditions.
Documentation
References
Other resources
Sample code and libraries: IAM-related sample code
Developer tools: Command line and GUI-based tools for use with IAM APIs
IAM discussion forum: Discussion forum for IAM-related topics
Workshops
Videos
Videos
Video playlists
Featured blog posts
- How to monitor and query IAM resources at scale - Part 1
- How to monitor and query IAM resources at scale - Part 2
- How to use policies to restrict where EC2 instance credentials can be used from
- How to visualize IAM Access Analyzer policy validation findings with Amazon Quicksight
- How to prioritize IAM Access Analyzer findings
- Extend AWS IAM roles to workloads outside of AWS with IAM Roles Anywhere
- How to use AWS Private Certificate Authority short-lived certificate mode
- Using AWS Distro for OpenTelemetry and IAM Roles Anywhere on-premises to ingest metrics into Amazon Managed Service for Prometheus
Blog posts
Loading
Loading
Loading
Loading
Loading