IAM what's that?

It is pretty quirky to understand but extremely powerful.Cannot dive deep at once, experiment with code-base and enhance the understanding. But to get started, think of it as A tool-set to control the access to resources provided by AWS.

Just generalizing the idea, access to resources could be of any form as following:-
πŸ’ People using Resources directly.
EX: I want to give other users of my account to have access to an only S3 bucket, or it could be access to another AWS account
πŸ’ AWS Resource using other AWS Resources to get work done.
Ex: I want to build my application, store its output and I want codebuild to take care of it on my behalf. I have my source code in codecommit and I want the desired result in ECR. So codebuild which is AWS provided resource needs access to codecommit resource and ECR resource too to carry out the flow.
Simple as that, but the quirkiness will start when trying to implement the way we want. :P
ALERT! Never use the root account. It can lead to terror. By default, Root has access to all and has all permission.

Features of IAM

πŸ’ Federated with other systems: Third-party based logins.
πŸ’ Cross account access: Access resources/performing actions from AWS account to another AWS account.
πŸ’ Granular control access: Complete control of what to access/perform actions on what resource, when and how, it could be any conditions set.
πŸ’ MFA: OTP based login gives an additional layer of security.
Remember everything in AWS communicates via API, will get into it later.

It takes care of two processes:

πŸ’ Authentication:
Are you the one for me? XD This step may not be necessary in few places such as S3...will know about it in later posts
πŸ’ Authorization:
Are you allowed to do whatsoever actions?

IAM components:

What makes IAM work?

πŸ’ Has an identity as a user.
πŸ’ Have credentials to login via console/CLI
πŸ’ Has secret key and access which should never be shared. BAD!
πŸ’ By default, denied access to all.

πŸ’ Two or more User forms a group.
πŸ’ Create a group, add users to it and provide common permission for easy and organized control because apart from defined users some of them have common requirements.

πŸ’ To give exclusive permission.
πŸ’ The best way I understood this was with Linux example.
Ex: I have been denied write operation on /etc/hosts file.
I'll use sudo and do write operations.
So, here write operation is exclusive permission I needed so I assumed to be sudo (role) and did it. Simple isn't it!

πŸ’ Defines the action.What you have access to and what you don't.
πŸ’ A policy can be attached to User, Group, Role.
πŸ’ They are predefined and can be written by us.
πŸ’ Actions or resources that are not explicitly allowed are denied by default
πŸ’ Only 10 Managed policy can be attached to a role/user/group, if more needed request AWS customer support.
πŸ’ There can be any inline number of policies attached to role/user/group.

Types of Policy

Identity-based policies
Permission policies, attached to IAM identity (users/groups/role). these can be:
πŸ’ AWS Managed policy: Managed by AWS
πŸ’ Custome policy: Managed by us.
πŸ’ Inline Policy:
Particular to respective role/users/group..
Inline policy cannot be shared with others.
When Role/user having inline policy is deleted, inline policy also gets deleted.

πŸ’ Resource-based policies
Policy attached to resource (principal) directly (i.e S3 and IAM role trust policy) instead of using a role as a proxy. It is mandatory to specify principal.
Basically, it tells what action a specified entity can perform on resources under given circumstances. Will get into practicals for better understanding.
Resources that you want to share are limited to resources that support resource-based policies. Can attach resource-based policies to:
πŸ“ Amazon S3,
πŸ“ Amazon Simple Notification Service (SNS),
πŸ“ Amazon Simple Queue Service (SQS),
πŸ“ Amazon Glacier Vaults,
πŸ“ AWS Lambda functions,
πŸ“ VPC-endpoint policies

πŸ’ Service Control Policies
Service Control Policies (SCPs) are used to manage all the AWS Accounts in your AWS Organization. An organization might maintain numerous accounts based on needs...for production, for development, for testing..yadda yadda ...By default, it has all allow permissions.

Some essentials: When trying to use roles and policies first understand what policies to be applied to? under what conditions? on what resources? then understand the permission polices that are applicable and how it works on the resource independently?

Neat-Picks to be understood

πŸ¦‹ IAM is a global service, which means it’s covering all regions within an account.
πŸ¦‹ By default, user/role has deny permissions. When given permission it is within their account.
πŸ¦‹ Access to cross-account, must write policy and attach.
πŸ¦‹ When explicitly allow action/resource is mentioned the rest are denied. πŸ¦‹ Always evaluate policies combined, precedence to deny is given first, thus it first checks for deny actions and then checks for allow actions
πŸ¦‹ All actions are independent of each other. Treat it as independently.