⌂ Home

IAM Security Best Practices

Structure identities, policies, and monitoring for resilient access.

IAM entity hierarchy

AWS Account / Organization
Users
Groups
Roles
Inline & managed policies
Permission boundaries
SCPs (org)

Best practices — expand each card

  1. Require hardware or app MFA for console; protect root with MFA and minimal use.

  2. Start with zero permissions; add actions/resources explicitly; review quarterly.

  3. Use IAM roles for workloads, OIDC from CI, instance profiles; rotate any remaining keys.

  4. Alert on CreateUser, AttachUserPolicy, console login anomalies.

  5. Short STS lifetimes; automate key rotation where keys are unavoidable.

  6. Restrict by IP, VPC endpoint, MFA presence, time window, and resource tags.