IAM is probably the most common security service of IAM, so many service integrate with IAM and the features that it provides, and so it makes perfect sense to ensure you are aware of some of the best practices from an access control perspective.
Identity and Access Management
Avoid sharing identities
You should not share an IAM user identity among a shared group of users. This makes it very difficult from a security risk perspective, especially when an incident occurs as a result of an action that was carried out by that identity. It's easy to track what actions a user has carried out by analyzing the logs from CloudTrail. However, if this user is shared by multiple parties, it's not so easy to identify the individual...