BQRoster | AWS Journey
Contact

Common AWS IAM Groups

#awsiam
#aws

Published Feb 6, 2025

Common IAM Groups

In AWS IAM, a user group is a collection of IAM users, that are managed as a single entity. The main purpose of a user group is to simplify the management of permissions for multiple users. Instead of assigning permissions individually to each user, you can assign policies to a user group, and any users added to that group will inherit those permissions.

We share a list of the common AWS IAM Groups you can create for your organization.

Common IAM Groups

Administrators

Permissions: Full access to all AWS resources.
Use case: Users who need full administrative access to manage AWS resources and services.
Policy Example: AdministratorAccess
Group Name: Admins

Power Users

Permissions: Similar to admins but without permission to manage IAM (Identity and Access Management) itself.
Use case: Users who need nearly full access but not control over IAM settings and user management.
Policy Example: PowerUserAccess
Group Name: PowerUsers

Read-Only Users

Permissions: Read-only access to all AWS resources.
Use case: Users who only need to view resources and settings but cannot modify anything.
Policy Example: ReadOnlyAccess
Group Name: ReadOnly

Billing and Cost Management

Permissions: Access to billing and cost management services only.
Use case: Users who need to view billing information but should not have access to other resources.
Policy Example: AWSBillingReadOnlyAccess
Group Name: Billing

Security Auditors

Permissions: Read-only access to security-related resources (e.g., AWS CloudTrail, security logs).
Use case: Users who need to audit security activities and monitor for potential vulnerabilities.
Policy Example: SecurityAudit
Group Name: Auditors

Support

Permissions: Limited access to AWS resources and the ability to manage support cases.
Use case: Users who require support-related access but should not interact with other resources.
Policy Example: AWSSupportAccess
Group Name: Support

S3 Bucket Access

Permissions: Access to specific S3 buckets and their contents.
Use case: Users who need to manage or access specific S3 buckets.
Policy Example: AmazonS3FullAccess or custom S3 policies restricting access to specific buckets.
Group Name: S3Users

Database Access

Permissions: Access to RDS, DynamoDB, and other database services.
Use case: Users who need to manage or access databases in AWS.
Policy Example: AmazonRDSFullAccess, AmazonDynamoDBFullAccess
Group Name: DBAdmins or DBUsers

Lambda and Compute Access

Permissions: Access to manage AWS Lambda functions, EC2 instances, or other compute services.
Use case: Developers and engineers who need to deploy and manage serverless applications or compute resources.
Policy Example: AWSLambda_FullAccess, AmazonEC2FullAccess
Group Name: LambdaDev or ComputeAdmins

Developer Access

Permissions: Access to specific development-related resources, including EC2, Lambda, and Code services.
Use case: Developers who need to build, test, and deploy applications.
Policy Example: AmazonEC2FullAccess, AWSLambda_FullAccess, AWSCodeBuildAdminAccess
Group Name: Developers

Jose Burgos | Full Stack Dev | AWS Embracing Journey

Jose Burgos

Full Stack Developer

Onboard Journey to Amazon Web Services