Find the Best Cosmetic Hospitals

Explore trusted cosmetic hospitals and make a confident choice for your transformation.

“Invest in yourself — your confidence is always worth it.”

Explore Cosmetic Hospitals

Start your journey today — compare options in one place.

AWS Tutorials: IAM Roles Complete Guide

Common terminologies used in IAM Roles and IAM Policies in AWS Identity and Access Management (IAM)

TermDescription
IAM RoleAn IAM entity that defines a set of permissions for making AWS service requests. Roles can be assumed by users, applications, or services.
IAM PolicyA document that defines permissions for IAM users, groups, and roles. Policies can be attached to roles or users to control access to AWS resources.
Trust PolicyA policy attached to an IAM role that specifies who can assume the role. It establishes trust between the role and the entity assuming it.
Permissions PolicyA policy attached to an IAM user, group, or role that defines what actions are allowed or denied on which AWS resources.
PrincipalThe entity (user, role, service) that is allowed or denied access to AWS resources. It specifies “who” in IAM policies.
ActionSpecifies the specific AWS actions that can be allowed or denied (e.g., s3:PutObject, ec2:StartInstances).
ResourceSpecifies the AWS resources to which the policy applies (e.g., an S3 bucket, an EC2 instance).
ConditionAdditional conditions that must be met for a policy to apply, such as IP address restrictions, multi-factor authentication (MFA), or time constraints.
Assume RoleThe process by which an IAM principal (user or service) temporarily takes on the permissions of an IAM role.
Managed PolicyA standalone policy created by AWS or by users that can be attached to multiple users, groups, or roles.
Inline PolicyA policy embedded directly in a single IAM user, group, or role. It’s specific to that entity and cannot be reused.
AWS Managed PolicyA policy created and managed by AWS, which includes common permissions sets, such as AmazonS3ReadOnlyAccess.
Customer Managed PolicyA custom policy created by the user to provide specific permissions not covered by AWS Managed Policies.
Policy DocumentThe JSON document that defines an IAM policy, specifying permissions, actions, resources, and conditions.
Policy VersionIAM policies have versions to manage updates. Only one version can be the “default” version that is in effect at any time.
Session PolicyA policy applied during the temporary session of a user who assumes a role, allowing for additional, session-specific permissions.
Role Session NameA unique identifier for a session when an IAM role is assumed, often used for logging and tracking purposes.
Policy SimulatorA tool in IAM that allows testing of policies to see how they will affect access for a specific user or role.
STS (Security Token Service)Service that provides temporary credentials to assume roles, allowing short-term access to AWS resources.
Permission BoundaryAn advanced feature that sets a limit on the maximum permissions an IAM role or user can have, regardless of their other attached policies.
Temporary Security CredentialsShort-term credentials provided by assuming a role, intended for temporary access to AWS resources.
Service-linked RoleA role created by AWS services that allow those services to manage resources on the user’s behalf (e.g., AWSServiceRoleForSupport).
PassRoleAn IAM permission that allows one role to “pass” another role to an AWS service, used in scenarios like launching an EC2 instance with an IAM role.
Principal ARNThe Amazon Resource Name (ARN) that uniquely identifies a principal entity, such as an IAM user or role, within AWS.
EffectSpecifies whether the policy statement allows or denies access (e.g., "Effect": "Allow" or "Effect": "Deny").
Federated IdentityAllows external identities (e.g., from Google, Facebook, or corporate directory) to access AWS resources through IAM roles.

Difference of inline policies and assume role policies (also known as trust policies)

In AWS IAM (Identity and Access Management), inline policies and assume role policies (also known as trust policies) serve different purposes within the lifecycle of IAM roles. Here’s a breakdown of the key differences between the two:

1. Inline Policy:

  • Purpose: An inline policy is a permission policy that is embedded directly into an IAM role, user, or group. It defines what actions the role can perform on AWS resources.
  • Function: Controls what actions the role can take and on which resources.
  • Policy Type: These are permission policies. They grant permissions to the entity (role, user, or group) they are attached to.
  • Example Use Case: An inline policy for an IAM role might allow it to perform specific actions, such as listing all S3 buckets or launching EC2 instances.

Where It’s Stored: Inline policies are stored directly in the IAM role, user, or group they are attached to.

Control: Fine-grained control for individual users, roles, or groups.

2. Assume Role Policy (Trust Policy):

  • Purpose: The assume role policy (or trust policy) defines who or what entity (user, service, or another AWS account) can assume the IAM role. This policy grants permission to another entity to assume the role and temporarily gain its permissions.
  • Function: Controls who can assume the role and under what conditions.
  • Policy Type: These are trust policies. They define the relationship between the role and the principal (like an IAM user, another role, or AWS service) that can assume it.
  • Example Use Case: An EC2 instance might assume an IAM role that has permissions to write to an S3 bucket, but only if the trust policy allows the EC2 service to assume the role.

Where It’s Stored: The assume role policy is stored in the IAM role itself and determines who can assume the role.

Control: Controls who can assume the role, typically allowing a user or service (like EC2, Lambda, etc.) to use the role’s permissions.

Summary of Differences:

FeatureInline PolicyAssume Role Policy (Trust Policy)
PurposeGrants permissions for actions on AWS resourcesDefines who (user, service, AWS account) can assume the role
TypePermission policyTrust policy
ControlsWhat actions the role can performWho can assume the role
Attached ToRoles, users, or groupsIAM roles
Example UsageAllow a role to list S3 buckets or start EC2 instancesAllow EC2 instances to assume a role and access its policies
Policy Example"Action": "s3:ListBucket""Principal": "ec2.amazonaws.com"
Stored InEmbedded directly in the role, user, or groupDefined within the IAM role itself

Key Takeaways:

  • Inline policies grant permissions to the entity they are attached to.
  • Assume role policies (trust policies) define who can assume the role and temporarily gain its permissions.

Find Trusted Cardiac Hospitals

Compare heart hospitals by city and services — all in one place.

Explore Hospitals
I’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at <a href="https://www.cotocus.com/">Cotocus</a>. I share tech blog at <a href="https://www.devopsschool.com/">DevOps School</a>, travel stories at <a href="https://www.holidaylandmark.com/">Holiday Landmark</a>, stock market tips at <a href="https://www.stocksmantra.in/">Stocks Mantra</a>, health and fitness guidance at <a href="https://www.mymedicplus.com/">My Medic Plus</a>, product reviews at <a href="https://www.truereviewnow.com/">TrueReviewNow</a> , and SEO strategies at <a href="https://www.wizbrand.com/">Wizbrand.</a> Do you want to learn <a href="https://www.quantumuting.com/">Quantum Computing</a>? <strong>Please find my social handles as below;</strong> <a href="https://www.rajeshkumar.xyz/">Rajesh Kumar Personal Website</a> <a href="https://www.youtube.com/TheDevOpsSchool">Rajesh Kumar at YOUTUBE</a> <a href="https://www.instagram.com/rajeshkumarin">Rajesh Kumar at INSTAGRAM</a> <a href="https://x.com/RajeshKumarIn">Rajesh Kumar at X</a> <a href="https://www.facebook.com/RajeshKumarLog">Rajesh Kumar at FACEBOOK</a> <a href="https://www.linkedin.com/in/rajeshkumarin/">Rajesh Kumar at LINKEDIN</a> <a href="https://www.wizbrand.com/rajeshkumar">Rajesh Kumar at WIZBRAND</a> <a href="https://www.rajeshkumar.xyz/dailylogs">Rajesh Kumar DailyLogs</a>

Related Posts

Terraform Backend Tutorial

Terraform is a popular open-source infrastructure as code tool used to create and manage infrastructure resources. The state of the infrastructure resources managed by Terraform is stored…

Read More

Best Tools for Software Composition Analysis (SCA)

Here’s a clear and professional explanation of the three related concepts you asked about — all of which are critical parts of secure software development, especially in…

Read More

Top 10 AI Code Review Tools in 2026: Features, Pros, Cons & Comparison

Introduction In 2026, AI code review tools have become essential for developers aiming to enhance code quality, streamline workflows, and accelerate software delivery. These tools leverage advanced…

Read More

Top 10 Expense Management Tools in 2026: Features, Pros, Cons & Comparison

Introduction Expense management tools are critical for businesses of all sizes in 2026 as they help streamline financial processes, improve budgeting, ensure compliance, and enhance financial visibility….

Read More

Top 10 Web Application Firewall (WAF) Tools in 2026: Features, Pros, Cons & Comparison

Introduction In the rapidly evolving landscape of cybersecurity, Web Application Firewalls (WAFs) have become a critical component in defending web applications from malicious attacks such as SQL…

Read More

Top 10 Endpoint Management Tools in 2026: Features, Pros, Cons & Comparison

Introduction In 2026, businesses of all sizes are increasingly reliant on a variety of devices—laptops, desktops, mobile devices, and other endpoints—that connect to their networks. With the…

Read More
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x