Technical requirements

To perform the tasks mentioned within this chapter, you will need to have the correct permissions to allow you to perform a number of different actions within the IAM service, including the creation and management of users, groups, and roles, in addition to configuring MFA. The permissions given in the IAMFullAccess policy will be sufficient to carry out all the actions in this chapter.