IAM Security Reporting and Access Information tools
IAM Groups
IAM Roles
Policies
Users & Groups can be assigned JSON documents called policies describing what the group can do
Inline Policy
policy that’s embedded in an IAM identity (a user, group, or role). That is, the policy is an inherent part of the identity. Inline policies are useful if you want to maintain a strict one-to-one relationship between a policy and the identity to which it is applied.
Managed policy
Reusability
Central change management
Versioning and rolling back
Delegating permissions management
policy structure
Key pairs
Ec2 and cloudfront only
Create a digital SIGNATURE
Access Keys
Access key I’d
Secret access key
Sign programmatic requests to AWS (not accessing ec2 directly)