Effective IAM for AWS

Appendix - IAM roles quickstart

Appendix - IAM roles quickstart

This table details the common people IAM roles defined in Create IAM principals and provision access. Consider creating these roles in your AWS accounts to support common needs:

Role NameTypeDescriptionPresent in Account(s)
adminPersonUsed to perform emergency operational tasks and initial account configuration activities manually:
  • create initial or fix broken IAM configurations
  • configure resources needed by automated configuration management tools
  • file support cases
All accounts
securityPersonUsed by security engineers to inspect, build, and manage security policies and security-related infrastructure.All accounts
operationsPersonUsed to perform common operational tasks in an account manually, such as:
  • adjusting autoscaling rules (urgent)
  • reconfiguring a load balancer (urgent)
  • deploying certificates
  • adding a DNS record
  • filing support cases
Runtime, Shared Services, Delivery
network-engPersonUsed by network engineers to inspect, build, and manage network infrastructure, network security policies, and logs.Runtime, Shared Services, Delivery
database-engPersonUsed by database engineers and administrators to inspect, build, and manage datastores.Runtime, Shared Services, Delivery
cloud-engPersonUsed by platform engineers to build and manage the common infrastructure that applications deploy onto or into.Runtime, Shared Services, Delivery
releasePersonUsed by release (build, cm) engineers to build and manage delivery pipelines.Runtime, Delivery
observabilityPersonUsed by observability engineers to build and manage monitoring and logging systems that collect telemetry from AWS accounts, systems, and applications.All accounts
cost-mgmtPersonUsed by accounting or finance teams to investigate AWS expenditureManagement account
app-engPersonUsed by application engineers (developers) to build and manage applications used by either external or internal customers.Runtime
Edit this page on GitHub