Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.
3.4.1.1. IAM Entities for Human & Machine Access (Users, Groups, Roles, Identity Providers, Policies)
3.4.1.1. IAM Entities for Human & Machine Access (Users, Groups, Roles, Identity Providers, Policies)
Loading diagram...
IAM policy evaluation follows this flowchart for every API call. Understanding this order is the most important IAM concept for the exam.
IAM entities:
- Users: Individual identities with long-term credentials. Minimize — prefer roles.
- Groups: Collections of users sharing policies. Can't nest groups.
- Roles: Temporary credentials for services, apps, or federated users. The most important entity for DevOps.
- Identity Providers: Federation via SAML 2.0 (Active Directory) or OIDC (Cognito, Okta).
Policy types and evaluation order:
- SCPs (Organizations): Maximum permissions ceiling for the account
- Resource-based policies: Attached to resources (S3 bucket, KMS key)
- Identity-based policies: Attached to users, groups, or roles
- Permissions boundaries: Maximum ceiling for a specific entity
- Session policies: Limit permissions when assuming a role
Exam Trap: An explicit Deny in any policy always wins. If an SCP allows s3:* but an identity policy denies s3:DeleteBucket, the delete is denied. The exception: resource-based policies can grant cross-account access even without an identity policy Allow (but SCPs still apply).

Written byAlvin Varughese•Founder•15 professional certifications