Identity & Access Management (IAM)

Who gets in, what they can touch, and for how long — enforced by identity, authentication, authorization, and least privilege.

Overview

IAM is the foundation of every cloud environment. It defines how identities are created, authenticated, authorized, and governed across applications and infrastructure.
Strong IAM ensures users have the right access at the right time, while poor IAM practices often lead to privilege escalation, unauthorized access, or full compromise.
This page documents the IAM labs I’ve completed and the advanced identity engineering skills I’m building toward.

Completed Labs

In Progress Labs

Advanced IAM Labs

Higher-level identity engineering projects I will build as I progress through AWS, Zero Trust, and cloud security architecture.