Shared access to your AWS account
Each IAM user has three main components- A user-name, A password, and Permissions to access various resources.
Granular permissions
You can apply granular permissions with IAM.
Secure access to AWS resources for application that run on Amazon EC2.
Multi-Factor authentication
Multi-factor authentication can be enabled/enforced for the AWS account and for individual users under the account. MFA uses an authentication device that continually generates random, six-digit, single-use authentication codes.
You can authenticate using an MFA device in the following ways:
It is a best practice to always setup multi-factor authentication on the root account. The “root account” is the account created when you setup the AWS account. It has complete Admin access and is the only account that has this access by default. It is a best practice to not use the root account for anything other than billing.
Identity federation
Identity Federation (including AD, Facebook etc.) can be configured allowing secure access to resources in an AWS account without creating an IAM user account.
Identity information for assurance.
PCI DSS compliance. (Payment Card Industry Data Security Standard)
Integrated with many AWS services.
Eventually consistent.
Free to use.
By default new users are created with NO access to any AWS services – they can only login to the AWS console. Permission must be explicitly granted to allow a user to access an AWS service. IAM users are individuals who have been granted access to an AWS account.