Skip to main content

AWS IAM: user access control and user management

AWS IAM helps you control access to your AWS services and resources

AWS IAM - security AWS IAM (Identity and Access Management) is a web service that helps you securely control access to AWS services and resources.
The service allows you to create and manage AWS users and groups within your account, and use permissions to permit or deny their access to AWS resources. A user is an identity (within an AWS Account) with unique security credentials that can be used to access AWS Services.
Without IAM, organizations with multiple users and systems would be forced to either create multiple AWS accounts, each with its own billing and subscriptions to AWS products, or employees would all have to share the security credentials of a single AWS account. There would be no way to control the tasks a particular user or system could perform and which AWS resources they might use.

Limiting user access with AWS IAM:

With IAM, you can control who can access which resources. For example, you can create individual users, each with their own user name, password, and access keys. You can assign them unique authority over precisely the resources and services they need.
Whenever a person or application communicates with an AWS resource, they are asked for security credentials. These credentials are helpful in classifying who is making the call and whether or not to allow the requested access.
But why not just rely on a single identity? Whenever you log into your AWS account using your email address and password, you get full access to all your account’s resources. Because that kind of access is very difficult to properly control, AWS suggests that you use only IAM credentials for your everyday interactions with AWS, and lock away your account credentials.

AWS IAM allows you to:

1. Create individual IAM users and groups to assign permissions to IAM users
You could, for example, set up an Administration Group as soon as you create your account. You could then add to it all the IAM users who will need administrator rights to your account. Now, they – and only they – will have full rights over your account resources.
2. Enable AWS Multi-Factor Authentication (AWS MFA) for privileged users
To help prevent fraudulent access, AWS recommends that you use multi-factor authentication (MFA) in addition to your AWS account’s email address and password. A device (like a smart phone) in the possession of MFA users can be configured to generate a unique authentication code and provide extra security.
3. Request temporary security credentials
For users or apps requiring on-demand access to your services and resources, AWS IAM allows you to offer one-off permissions, further limiting your exposure to risk.
4. Force your users to choose strong passwords
You can require that your users create passwords of a defined strength (minimum length, non-alphabetic characters, etc.) and that they change them regularly.
5. Rotate credentials regularly and Remove unnecessary credentials
Remove unused IAM user credentials (i.e., passwords and access keys). For example, an IAM user that is used exclusively for an application, does not need a password (passwords are necessary only to sign in to AWS websites). Similarly, if a user does not and will never use access keys, there’s no reason for the user to have them.
6. Use AWS IAM roles for applications running on Amazon EC2 instances
In order to access other AWS services, applications that run on an Amazon EC2 instance need credentials. Here IAM plays a vital role in providing these credentials to the applications in secure way. A role is an entity that has its own set of permissions, but that isn’t a user or group.
AWS IAM dynamically provides temporary credentials to an EC2 instance, and these credentials are automatically rotated for you.
7. Use policies for extra security
You can apply permissions to an IAM principal entity (an IAM user, group or role) by attaching a custom policy to the principal entity.
For example, you can write conditions to specify a range of allowable IP addresses that a request must come from, or specify that a request is allowed only within a specified date or time range. You can also set conditions that require the use of SSL or MFA (multifactor authentication). For example, you can require that a user has authenticated with an MFA device in order to be allowed to terminate an Amazon EC2 instance.
You can attach multiple policies to a principal entity, and each policy can contain multiple permissions.

AWS IAM user management

One cannot set usage quotas on IAM users, as all limits apply to the AWS account as a whole. So for example, if your AWS account has a limit of twenty Amazon EC2 instances, any IAM user with EC2 permissions will be able to launch up to that limit (assuming that there are no other instances associated with other account users).
While there is no limit to the number of AWS IAM roles you can assume, you can only act as one IAM role when making requests to AWS services. You are however limited to a maximum of 250 IAM roles for a single account. If you need more roles, submit a IAM limit increase request form with your use case and your AWS IAM role increase will be considered.


Protect your AWS environment by using the high-level security of AWS IAM. It costs nothing extra and greatly strengthens the value of your username and password credentials.

Written by

Sudhi Seshachala

Sudhi is part of Cloud Technology Partners & is a trusted advisor and strategic consultant to many C level executives and IT Directors. He brings 18+ years diverse experience covering software, IT operations, cloud technologies, and management. Have led several global teams in HP, Sun/Oracle, SeeBeyond and few startups to deliver scalable and highly available business/technology products and solutions. He has expertise in systems management, monitoring and integrated SaaS and on-premise applications addressing a wide range of business problems.

Related Posts

— February 11, 2019

WaitCondition Controls the Pace of AWS CloudFormation Templates

AWS's WaitCondition can be used with CloudFormation templates to ensure required resources are running.As you may already be aware, AWS CloudFormation is used for infrastructure automation by allowing you to write JSON templates to automatically install, configure, and bootstrap your ...

Read more
  • AWS
— January 24, 2019

The 9 AWS Certifications: Which is Right for You and Your Team?

As companies increasingly shift workloads to the public cloud, cloud computing has moved from a nice-to-have to a core competency in the enterprise. This shift requires a new set of skills to design, deploy, and manage applications in the cloud.As the market leader and most mature p...

Read more
  • AWS
  • AWS certifications
— November 28, 2018

Two New EC2 Instance Types Announced at AWS re:Invent 2018 – Monday Night Live

The announcements at re:Invent just keep on coming! Let’s look at what benefits these two new EC2 instance types offer and how these two new instances could be of benefit to you. If you're not too familiar with Amazon EC2, you might want to familiarize yourself by creating your first Am...

Read more
  • AWS
  • EC2
  • re:Invent 2018
— November 21, 2018

Google Cloud Certification: Preparation and Prerequisites

Google Cloud Platform (GCP) has evolved from being a niche player to a serious competitor to Amazon Web Services and Microsoft Azure. In 2018, research firm Gartner placed Google in the Leaders quadrant in its Magic Quadrant for Cloud Infrastructure as a Service for the first time. In t...

Read more
  • AWS
  • Azure
  • Google Cloud
Khash Nakhostin
— November 13, 2018

Understanding AWS VPC Egress Filtering Methods

In order to understand AWS VPC egress filtering methods, you first need to understand that security on AWS is governed by a shared responsibility model where both vendor and subscriber have various operational responsibilities. AWS assumes responsibility for the underlying infrastructur...

Read more
  • Aviatrix
  • AWS
  • VPC
— November 10, 2018

S3 FTP: Build a Reliable and Inexpensive FTP Server Using Amazon’s S3

Is it possible to create an S3 FTP file backup/transfer solution, minimizing associated file storage and capacity planning administration headache?FTP (File Transfer Protocol) is a fast and convenient way to transfer large files over the Internet. You might, at some point, have conf...

Read more
  • Amazon S3
  • AWS
— October 18, 2018

Microservices Architecture: Advantages and Drawbacks

Microservices are a way of breaking large software projects into loosely coupled modules, which communicate with each other through simple Application Programming Interfaces (APIs).Microservices have become increasingly popular over the past few years. The modular architectural style,...

Read more
  • AWS
  • Microservices
— October 2, 2018

What Are Best Practices for Tagging AWS Resources?

There are many use cases for tags, but what are the best practices for tagging AWS resources? In order for your organization to effectively manage resources (and your monthly AWS bill), you need to implement and adopt a thoughtful tagging strategy that makes sense for your business. The...

Read more
  • AWS
  • cost optimization
— September 26, 2018

How to Optimize Amazon S3 Performance

Amazon S3 is the most common storage options for many organizations, being object storage it is used for a wide variety of data types, from the smallest objects to huge datasets. All in all, Amazon S3 is a great service to store a wide scope of data types in a highly available and resil...

Read more
  • Amazon S3
  • AWS
— September 18, 2018

How to Optimize Cloud Costs with Spot Instances: New on Cloud Academy

One of the main promises of cloud computing is access to nearly endless capacity. However, it doesn’t come cheap. With the introduction of Spot Instances for Amazon Web Services’ Elastic Compute Cloud (AWS EC2) in 2009, spot instances have been a way for major cloud providers to sell sp...

Read more
  • AWS
  • Azure
  • Google Cloud
  • SpotInst
— August 23, 2018

What are the Benefits of Machine Learning in the Cloud?

A Comparison of Machine Learning Services on AWS, Azure, and Google CloudArtificial intelligence and machine learning are steadily making their way into enterprise applications in areas such as customer support, fraud detection, and business intelligence. There is every reason to beli...

Read more
  • AWS
  • Azure
  • Google Cloud
  • Machine Learning
— August 17, 2018

How to Use AWS CLI

The AWS Command Line Interface (CLI) is for managing your AWS services from a terminal session on your own client, allowing you to control and configure multiple AWS services.So you’ve been using AWS for awhile and finally feel comfortable clicking your way through all the services....

Read more
  • AWS