Securely manage identities and access to AWS services and resources","id":"product-detail-overview#hero-1-aws-identity-and-access-management","headline":"AWS Identity and Access Management","subheading":"Securely manage identities and access to AWS services and resources","breadcrumbs":"

Use AWS Identity and Access Management (IAM) to manage and scale workload and workforce access securely supporting your agility and innovation in AWS.","id":"collection-text-media#overview-1-prod-overview-aws-iam","mediaPosition":"right","mediaAltText":"Why use IAM? (1:17) "},"metadata":{"tags":[{"id":"GLOBAL#pattern#overview","name":"Overview","namespaceId":"GLOBAL#pattern","description":"Overview","metadata":{}},{"id":"GLOBAL#product#iam","name":"AWS Identity and Access Management","namespaceId":"GLOBAL#product","description":"AWS Identity and Access Management","metadata":{}}]}}]},"metadata":{"auth":{},"pagination":{"empty":false,"present":true},"testAttributes":{}},"context":{"page":{"locale":null,"site":null,"pageUrl":"https://aws.amazon.com/iam/","targetName":null,"pageSlotId":null,"organizationId":null,"availableLocales":null},"environment":{"stage":"prod","region":"us-east-1"},"sdkVersion":"1.0.115"},"refMap":{"manifest.js":"47864e0370","rt-text-media-collection.js":"07ca5af217","rt-text-media-collection.rtl.css":"6e99be202e","rt-text-media-collection.css":"a2f6e3274d","rt-text-media-collection.css.js":"364e78221d","rt-text-media-collection.rtl.css.js":"6e41cc5eeb"},"settings":{"templateMappings":{"hyperlinkText":"hyperlinkText","hyperlinkUrl":"hyperlinkUrl","heading":"heading","mediaAltText":"mediaAltText","mediaPosition":"mediaPosition","mediaUrl":"mediaUrl","subheader":"subheader","bodyContent":"bodyContent","videoOverlayTitle":"videoOverlayTitle","videoThumbnailUrl":"videoThumbnailUrl","videoPlayButtonText":"videoPlayButtonText","dark":"dark"}}}

Why use IAM?

Use AWS Identity and Access Management (IAM) to manage and scale workload and workforce access securely supporting your agility and innovation in AWS.

Benefits of IAM

Set and manage guardrails with broad permissions, and move toward least privilege by using fine-grained access controls for your workloads.
Manage identities across single AWS accounts or centrally connect identities to multiple AWS accounts.
Grant temporary security credentials for workloads that access your AWS resources using IAM and grant your workforce access with AWS IAM Identity Center.
Generate least-privilege policies, verify external and unused access to resources, and continually analyze to rightsize permissions.

Use cases

Create granular permissions based on user attributes—such as department, job role, and team name—by using attribute-based access control.

Learn about attribute-based access control

Manage per-account identities with IAM or use IAM Identity Center to provide multi-account access and application assignments across AWS.

Learn about centralizing identity and access management

Use service control policies to establish permissions guardrails for IAM users and roles, and implement a data perimeter around your accounts in AWS Organizations.

Learn about data perimeter guardrails

Streamline permissions management and use cross-account findings as you set, verify, and refine policies on the journey toward least privilege.

Learn about the least-privilege journey


Explore more of AWS