Skip to main content
Multi-CloudSecurityintermediate

Multi-Cloud IAM Rosetta Stone

Map equivalent IAM concepts and roles across AWS, Azure, and GCP.

CloudToolStack Team12 min readPublished Feb 22, 2026

Prerequisites

IAM Concept Filters

Category

IAM Concept Mappings

20 concepts

Root / Global Admin

identity
AWS
Root Account

The root user has unrestricted access to all resources in the AWS account. Best practice is to lock it down with MFA and avoid daily use.

Azure
Global Administrator

The highest-privilege role in Entra ID (Azure AD). Can manage all aspects of the directory and all services that use Entra ID for identity.

GCP
Super Admin

A Cloud Identity / Google Workspace super admin with irrevocable access to manage the organization and assign Organization Admin roles.

Admin Role

roles
AWS
IAMFullAccess / AdministratorAccess

AWS managed policies granting full IAM management or full access to all AWS services and resources.

Azure
Owner Role

An Azure RBAC built-in role that grants full access to manage all resources, including the ability to assign roles in Azure RBAC.

GCP
roles/owner

A basic IAM role granting full access to almost all Google Cloud resources, including permission to manage IAM policies.

Read-Only Access

roles
AWS
ReadOnlyAccess

An AWS managed policy that grants read-only access to all AWS services without allowing any write or modification operations.

Azure
Reader Role

An Azure RBAC built-in role that lets you view all resources but not make any changes or manage access.

GCP
roles/viewer

A basic IAM role granting read-only access to view existing resources and data across Google Cloud services.

Identity Provider

identity
AWS
AWS IAM

AWS Identity and Access Management is the core service for managing users, groups, roles, and permissions for AWS resources.

Azure
Entra ID (Azure AD)

Microsoft Entra ID (formerly Azure Active Directory) is the cloud identity and access management service for Azure and Microsoft 365.

GCP
Cloud Identity

Google Cloud Identity is an Identity-as-a-Service (IDaaS) platform that manages users and groups for Google Cloud and Workspace.

Service Identity

identity
AWS
IAM Role

An IAM role is an identity with specific permissions that can be assumed by services, applications, or federated users instead of a single person.

Azure
Managed Identity

Azure Managed Identities provide an automatically managed identity in Entra ID for applications to use when connecting to resources.

GCP
Service Account

A special Google account that belongs to an application or compute workload rather than an individual user, used for server-to-server auth.

Policy

authorization
AWS
IAM Policy

A JSON document defining permissions (Allow/Deny) attached to identities or resources to control access to AWS services and resources.

Azure
Azure Policy

A service that creates, assigns, and manages policies to enforce rules and effects on Azure resources for governance and compliance.

GCP
IAM Policy

A policy binding that attaches one or more members to a role at a specific level (org, folder, project, or resource) in the hierarchy.

Role-Based Access Control

authorization
AWS
IAM Policies + Roles

AWS uses identity-based and resource-based JSON policies attached to IAM users, groups, and roles to implement access control.

Azure
Azure RBAC

Azure Role-Based Access Control provides built-in and custom roles assigned at management group, subscription, resource group, or resource scope.

GCP
Cloud IAM Roles

GCP IAM uses predefined, basic, and custom roles bound to members at organization, folder, project, or resource level.

MFA / Multi-Factor Auth

authentication
AWS
IAM MFA

AWS IAM supports virtual MFA devices, hardware tokens, and FIDO security keys to add a second factor to user sign-in.

Azure
Entra ID MFA

Microsoft Entra multifactor authentication requires two or more verification methods including the Authenticator app, phone, or FIDO2 keys.

GCP
2-Step Verification

Google's 2-Step Verification adds a second layer of identity verification via prompts, security keys, TOTP apps, or backup codes.

Single Sign-On

authentication
AWS
AWS IAM Identity Center (SSO)

Centrally manage workforce access to multiple AWS accounts and applications using SAML 2.0 federation and a built-in identity store.

Azure
Entra ID SSO

Seamless single sign-on via Entra ID allows users to authenticate once and access all registered cloud and on-premises applications.

GCP
Cloud Identity SSO

Google Cloud Identity supports SAML-based SSO and third-party IdP integration for unified login across Google Cloud and Workspace.

Temporary Credentials

authentication
AWS
STS AssumeRole

AWS Security Token Service issues temporary, limited-privilege credentials via AssumeRole, AssumeRoleWithSAML, or AssumeRoleWithWebIdentity.

Azure
Managed Identity Token

Azure Managed Identities automatically acquire and rotate OAuth 2.0 tokens from Entra ID without storing secrets in code.

GCP
Workload Identity Federation

Allows external workloads to impersonate service accounts and access Google Cloud resources without exporting service account keys.

Resource Hierarchy

organization
AWS
Account

An AWS account is the fundamental isolation boundary containing resources, with its own billing and IAM configuration.

Azure
Subscription

An Azure subscription is a logical container used to provision resources, acting as a billing and access-control boundary.

GCP
Project

A Google Cloud project organizes resources, serves as an IAM and billing boundary, and is the base unit of resource ownership.

Organization

organization
AWS
AWS Organizations

Centrally manage multiple AWS accounts with consolidated billing, service control policies (SCPs), and organizational units (OUs).

Azure
Management Groups

Organize subscriptions into a hierarchy of management groups for efficient governance, policy, and access management at scale.

GCP
GCP Organization

The root node of the Google Cloud resource hierarchy, linked to a Cloud Identity domain, providing centralized policy and access control.

Permission Boundary

authorization
AWS
Permissions Boundary

An advanced IAM feature that sets the maximum permissions an IAM entity can have, even if broader policies are attached.

Azure
Azure Blueprints

Define repeatable sets of Azure resources, policies, and role assignments that comply with organizational standards and requirements.

GCP
IAM Deny Policies

Deny policies let you set guardrails that override IAM allow policies, preventing specific principals from using certain permissions.

Audit Logging

compliance
AWS
CloudTrail

Records API calls and management events across AWS services for governance, compliance, and operational and risk auditing.

Azure
Activity Log

Azure Activity Log provides insight into subscription-level events like resource creation, updates, and role assignment changes.

GCP
Cloud Audit Logs

Provides Admin Activity, Data Access, System Event, and Policy Denied logs for who did what, where, and when across GCP.

Secret Management

security
AWS
Secrets Manager

Helps you protect access to applications, services, and IT resources by managing, rotating, and retrieving database credentials, API keys, and other secrets.

Azure
Key Vault (Secrets)

Azure Key Vault securely stores and manages secrets, keys, and certificates with access policies and Entra ID-based access control.

GCP
Secret Manager

A secure and convenient service for storing API keys, passwords, certificates, and other sensitive data with versioning and IAM-based access.

Encryption Key Management

security
AWS
AWS KMS

Key Management Service creates and controls encryption keys used to encrypt data, integrating with most AWS services for server-side encryption.

Azure
Key Vault (Keys)

Azure Key Vault manages cryptographic keys and supports HSM-backed keys for encrypting Azure resources and custom applications.

GCP
Cloud KMS

Manage cryptographic keys for cloud services, supporting symmetric, asymmetric, and HSM-backed keys for encryption and signing.

Conditional Access

authorization
AWS
IAM Condition Keys

AWS IAM policy conditions use context keys (IP, time, tags, MFA) to control when a policy grants or denies access.

Azure
Conditional Access Policies

Entra ID Conditional Access evaluates signals like user, device, location, and risk to enforce access decisions and session controls.

GCP
IAM Conditions

Role bindings can include CEL-based conditions that restrict when permissions are granted based on resource attributes and request context.

Group-Based Access

identity
AWS
IAM Groups

A collection of IAM users that lets you specify permissions for multiple users, simplifying permission management for teams.

Azure
Entra ID Groups

Security and Microsoft 365 groups in Entra ID that can be assigned roles and used for resource access management.

GCP
Google Groups

Google Groups can be used as principals in IAM policies, enabling group-level permission management across projects and resources.

Access Analyzer

compliance
AWS
IAM Access Analyzer

Analyzes resource policies to identify resources shared with external entities and validates IAM policies against best practices.

Azure
Entra ID Access Reviews

Enables regular reviews of user access, group memberships, and role assignments to maintain least-privilege and compliance.

GCP
IAM Recommender

Machine-learning-based recommendations to right-size IAM roles, remove unused permissions, and enforce the principle of least privilege.

Cross-Account / Tenant Access

authorization
AWS
Cross-Account Roles

IAM roles in one account can be assumed by principals in another account, enabling secure cross-account resource access.

Azure
Azure Lighthouse / B2B

Azure Lighthouse enables cross-tenant management, while Entra ID B2B provides guest user access across tenant boundaries.

GCP
Cross-Project IAM Bindings

Grant IAM roles to identities from other projects or organizations at the resource, project, folder, or org level.

Raw Data

[
  {
    "concept": "Root / Global Admin",
    "category": "identity",
    "aws": "Root Account",
    "azure": "Global Administrator",
    "gcp": "Super Admin"
  },
  {
    "concept": "Admin Role",
    "category": "roles",
    "aws": "IAMFullAccess / AdministratorAccess",
    "azure": "Owner Role",
    "gcp": "roles/owner"
  },
  {
    "concept": "Read-Only Access",
    "category": "roles",
    "aws": "ReadOnlyAccess",
    "azure": "Reader Role",
    "gcp": "roles/viewer"
  },
  {
    "concept": "Identity Provider",
    "category": "identity",
    "aws": "AWS IAM",
    "azure": "Entra ID (Azure AD)",
    "gcp": "Cloud Identity"
  },
  {
    "concept": "Service Identity",
    "category": "identity",
    "aws": "IAM Role",
    "azure": "Managed Identity",
    "gcp": "Service Account"
  },
  {
    "concept": "Policy",
    "category": "authorization",
    "aws": "IAM Policy",
    "azure": "Azure Policy",
    "gcp": "IAM Policy"
  },
  {
    "concept": "Role-Based Access Control",
    "category": "authorization",
    "aws": "IAM Policies + Roles",
    "azure": "Azure RBAC",
    "gcp": "Cloud IAM Roles"
  },
  {
    "concept": "MFA / Multi-Factor Auth",
    "category": "authentication",
    "aws": "IAM MFA",
    "azure": "Entra ID MFA",
    "gcp": "2-Step Verification"
  },
  {
    "concept": "Single Sign-On",
    "category": "authentication",
    "aws": "AWS IAM Identity Center (SSO)",
    "azure": "Entra ID SSO",
    "gcp": "Cloud Identity SSO"
  },
  {
    "concept": "Temporary Credentials",
    "category": "authentication",
    "aws": "STS AssumeRole",
    "azure": "Managed Identity Token",
    "gcp": "Workload Identity Federation"
  },
  {
    "concept": "Resource Hierarchy",
    "category": "organization",
    "aws": "Account",
    "azure": "Subscription",
    "gcp": "Project"
  },
  {
    "concept": "Organization",
    "category": "organization",
    "aws": "AWS Organizations",
    "azure": "Management Groups",
    "gcp": "GCP Organization"
  },
  {
    "concept": "Permission Boundary",
    "category": "authorization",
    "aws": "Permissions Boundary",
    "azure": "Azure Blueprints",
    "gcp": "IAM Deny Policies"
  },
  {
    "concept": "Audit Logging",
    "category": "compliance",
    "aws": "CloudTrail",
    "azure": "Activity Log",
    "gcp": "Cloud Audit Logs"
  },
  {
    "concept": "Secret Management",
    "category": "security",
    "aws": "Secrets Manager",
    "azure": "Key Vault (Secrets)",
    "gcp": "Secret Manager"
  },
  {
    "concept": "Encryption Key Management",
    "category": "security",
    "aws": "AWS KMS",
    "azure": "Key Vault (Keys)",
    "gcp": "Cloud KMS"
  },
  {
    "concept": "Conditional Access",
    "category": "authorization",
    "aws": "IAM Condition Keys",
    "azure": "Conditional Access Policies",
    "gcp": "IAM Conditions"
  },
  {
    "concept": "Group-Based Access",
    "category": "identity",
    "aws": "IAM Groups",
    "azure": "Entra ID Groups",
    "gcp": "Google Groups"
  },
  {
    "concept": "Access Analyzer",
    "category": "compliance",
    "aws": "IAM Access Analyzer",
    "azure": "Entra ID Access Reviews",
    "gcp": "IAM Recommender"
  },
  {
    "concept": "Cross-Account / Tenant Access",
    "category": "authorization",
    "aws": "Cross-Account Roles",
    "azure": "Azure Lighthouse / B2B",
    "gcp": "Cross-Project IAM Bindings"
  }
]

Key Takeaways

  1. 1IAM concepts map across providers but naming conventions differ significantly.
  2. 2AWS IAM Policies, Azure RBAC Role Definitions, and GCP IAM Roles serve the same purpose.
  3. 3Service accounts exist on all platforms but are configured differently.
  4. 4MFA/2FA enforcement is available across all providers with varying implementation.
  5. 5Cross-provider identity federation enables single sign-on across clouds.

Frequently Asked Questions

What is the Azure equivalent of an AWS IAM Role?
Azure uses RBAC Role Definitions (like Contributor, Reader, Owner) assigned at a scope. While AWS IAM Roles are assumed by principals, Azure role assignments bind a principal to a role definition at a specific scope.
How do service accounts differ across cloud providers?
AWS uses IAM Roles for services (no separate service account concept). Azure has Service Principals and Managed Identities. GCP has dedicated Service Accounts with key-based or workload identity authentication.
Can I use the same identity provider across all three clouds?
Yes. You can federate Azure AD (Entra ID), Okta, or any SAML/OIDC provider with all three clouds. AWS supports SAML and OIDC federation, Azure integrates natively with Entra ID, and GCP supports Workload Identity Federation.
What is the equivalent of AWS SCPs in other clouds?
Azure uses Azure Policy and Management Group policies for governance guardrails. GCP uses Organization Policy Constraints. All serve to restrict what actions can be performed regardless of individual permissions.
Which cloud has the most granular IAM permissions?
AWS has the most granular permission model with thousands of individual actions. GCP permissions are also granular but bundled into predefined roles. Azure RBAC uses actions and data actions with wildcard support.

Written by CloudToolStack Team

Cloud engineers and architects with hands-on experience across AWS, Azure, and GCP. We write guides based on real-world production patterns, not just documentation rewrites.

Disclaimer: This guide is for educational purposes. Cloud services change frequently; always refer to official documentation for the latest information. AWS, Azure, and GCP are trademarks of their respective owners.