🎯 1. What level are you controlling?

🔹 A. Account / Organization level

Keywords:

  • “limit an account”
  • “restrict services across accounts”
  • “govern multiple accounts”

👉 Use: AWS Organizations + SCP


🔹 B. User / Role level

Keywords:

  • “user can access…”
  • “role permission…”
  • “least privilege”

👉 Use: IAM Policy


🔹 C. Cross-account access

👉 Check next 👇


🔍 2. Does the service support Resource Policy?

✅ YES → Use Resource Policy

Examples: S3, SQS, SNS, Lambda

Pros:

  • No STS needed
  • Simpler
  • Lower latency

❌ NO → Use STS AssumeRole

Pattern: Account A → AssumeRole (Account B) → Access resource

Cons:

  • More complex
  • Higher latency

🔐 3. Is this about login / SSO?

Keywords:

  • “users sign in”
  • “centralized access”

👉 Use: IAM Identity Center


🏢 4. Corporate identity?

Keywords:

  • “Active Directory”
  • “Okta”

👉 Use: Microsoft AD / Federation


⚡ Cheat Sheet

KeywordSolution
limit accountSCP
cross-account simpleResource Policy
cross-account complexSTS
SSOIAM Identity Center
user permissionIAM

🧠 Mental Model

Organization (SCP)
→ IAM
→ STS
→ Resource Policy


💣 Common Traps

  • “efficiently” → Resource Policy
  • “entire account” → SCP
  • “centralized access” → IAM Identity Center