Learn AWS IAM By Writing Your First Policies for Groups and Users
Managing users and access to resources is part of a cloud administrator's job. This tutorial introduces basic concepts and a tutorial to demonstrate how to use the AWS Identity and Access Management service to manage user access to cloud resources.
title: "Learn AWS IAM By Writing Your First Policies for Groups and Users"
description: "Managing users and access to resources is part of a cloud administrator's job. This tutorial introduces basic concepts and a tutorial to demonstrate how to use the AWS Identity and Access Management service to manage user access to cloud resources."
tags:
- tutorials
- aws-iam
- it-pros
- security
authorGithubAlias: spara
authorName: Sophia Parafina
date: 2023-08-30
description: "Managing users and access to resources is part of a cloud administrator's job. This tutorial introduces basic concepts and a tutorial to demonstrate how to use the AWS Identity and Access Management service to manage user access to cloud resources."
tags:
- tutorials
- aws-iam
- it-pros
- security
authorGithubAlias: spara
authorName: Sophia Parafina
date: 2023-08-30
- Best practice for securing your AWS account
- What are AWS Identities and policies
- How to write and apply policies to control access to resources
About | |
---|---|
✅ AWS Level | Intermediate - 200 |
⏱ Time to complete | 45 minutes |
💰 Cost to complete | Free when using the AWS Free Tier or USD 1.01 |
🧩 Prerequisites | - AWS Account - AWS CLI version 2 |
📢 Feedback | Any feedback, issues, or just a 👍 / 👎 ? |
⏰ Last Updated | 2023-08-30 |
- Share the responsibility. Create an AWS administrator email distribution list with primary and alternate contacts. A group notification removes a single point of failure and adds flexibility to add and remove admins. Additionally, create email lists for operations, security notifications, and billing.
- The root user of an AWS account has full access to all the services. Protect this account by restricting the use of the root user by creating IAM identities.
- Use federated identities when possible. Manage user accounts with a central identity provider such as Active Directory, Okta, or AWS IAM Identity center. If your organization doesn’t have a identity provider solution, you can create user accounts directly with IAM but it is not recommended because each user is assigned long-term credentials that do not expire.
- Require multi-factor authentication (MFA). These devices respond to an authentication call to complete sign-in. Use MFA with long-term credentials such as root access or IAM user accounts.
- Implement a strong password policy that is resistant to brute force or social engineering attacks.
- Log events using AWS CloudTrail to audit usage.

- Sid - A Sid (or statement ID) is an optional identifier for the policy statement. Sids are descriptive names of a statement written in camel case.
- Principal - A principal can be a person or a role that can request an operation on an AWS resource.
- Authentication - AWS supports three kinds of authentication that allow principals to work with cloud resources.
- IAM users can authenticate by providing their account ID, a user name, and passwords. In addition, using MFA when signing in is best practice.
- Federated users use an identity provider such as Amazon, Facebook, Google, or Microsoft Active Directory to log into AWS.
- You can log in as the root user (not recommended) but you should use multi-factor authentication and temporary credentials to keep your account secure.
- Request - When you use the AWS CLI, AWS Management Console, or AWS API an AWS API call is sent to a service. The API call or request contains actions to be performed against resources. The request context includes: who made the request (the principal), environment data such as an IP address, and resource data such as a tag.
- Resources - A resource is an object within a service, for example a bucket is a resource in S3.
- Actions - Actions are what you can do with a resource and the type of action is defined by a resource. For example, S3 has a
CreateBucket
operation.
- Effect - An effect is either an Allow or Deny. All requests are denied by default, which is overridden by an explicit allow. Conversely, an explicit deny overrides any allows.
- Action - An action is specific to a service. The effect allows or denies an action.
- Resource - A resource is an object in a service. Sending a request specifies an action applied to a resource.
- Condition - A condition is optional. It can trigger an effect based on a value. AWS defines several general conditions and services have defined conditions.
home/JohnDoe/*
.https://<account id>.signin.aws.amazon.com/console
, e.g., https://123456789101.signin.aws.amazon.com/console
.my-unique-bucket-name
in the command:put-object
command. Remember to replace my-unique-bucket-name
with your bucket name:GroupPolicy.json
. We’ll create the policy first:https://<account-id>.signin.aws.amazon.com/console
).

Insufficient permissions to list objects
.
resource
is the bucket we created earlier and we've added a condition to allow listing the objects in the bucket.GroupPolicy.json
file and save the file. The updated policy looks like this:Yeemin
. You’ll be able to list the folders and objects in the bucket.
“Development/*”
as a condition. Listing any other folder is not allowed. The second statement enables listing, putting, and getting objects in the Development folder.AliciaDevPolicy.json
.

Insufficient permissions
message.
arn:aws:iam::<account id>:policy/policy-name
.—force
parameter. Note that we used the higher level s3 rb
command to delete the bucket for convenience, s3api
does not support the --force
parameter and would require deleting the objects in the bucket.attach-group-policy
command. This would allow access to the Developers folder to everyone in that group.Any opinions in this post are those of the individual author and may not reflect the opinions of AWS.