Multi-Cloud IAM Rosetta Stone
Map equivalent IAM concepts and roles across AWS, Azure, and GCP.
Prerequisites
- Familiarity with IAM concepts (users, roles, policies)
- Experience with at least one cloud provider's IAM system
IAM Concept Filters
IAM Concept Mappings
20 conceptsRoot / Global Admin
identityThe root user has unrestricted access to all resources in the AWS account. Best practice is to lock it down with MFA and avoid daily use.
The highest-privilege role in Entra ID (Azure AD). Can manage all aspects of the directory and all services that use Entra ID for identity.
A Cloud Identity / Google Workspace super admin with irrevocable access to manage the organization and assign Organization Admin roles.
Admin Role
rolesAWS managed policies granting full IAM management or full access to all AWS services and resources.
An Azure RBAC built-in role that grants full access to manage all resources, including the ability to assign roles in Azure RBAC.
A basic IAM role granting full access to almost all Google Cloud resources, including permission to manage IAM policies.
Read-Only Access
rolesAn AWS managed policy that grants read-only access to all AWS services without allowing any write or modification operations.
An Azure RBAC built-in role that lets you view all resources but not make any changes or manage access.
A basic IAM role granting read-only access to view existing resources and data across Google Cloud services.
Identity Provider
identityAWS Identity and Access Management is the core service for managing users, groups, roles, and permissions for AWS resources.
Microsoft Entra ID (formerly Azure Active Directory) is the cloud identity and access management service for Azure and Microsoft 365.
Google Cloud Identity is an Identity-as-a-Service (IDaaS) platform that manages users and groups for Google Cloud and Workspace.
Service Identity
identityAn IAM role is an identity with specific permissions that can be assumed by services, applications, or federated users instead of a single person.
Azure Managed Identities provide an automatically managed identity in Entra ID for applications to use when connecting to resources.
A special Google account that belongs to an application or compute workload rather than an individual user, used for server-to-server auth.
Policy
authorizationA JSON document defining permissions (Allow/Deny) attached to identities or resources to control access to AWS services and resources.
A service that creates, assigns, and manages policies to enforce rules and effects on Azure resources for governance and compliance.
A policy binding that attaches one or more members to a role at a specific level (org, folder, project, or resource) in the hierarchy.
Role-Based Access Control
authorizationAWS uses identity-based and resource-based JSON policies attached to IAM users, groups, and roles to implement access control.
Azure Role-Based Access Control provides built-in and custom roles assigned at management group, subscription, resource group, or resource scope.
GCP IAM uses predefined, basic, and custom roles bound to members at organization, folder, project, or resource level.
MFA / Multi-Factor Auth
authenticationAWS IAM supports virtual MFA devices, hardware tokens, and FIDO security keys to add a second factor to user sign-in.
Microsoft Entra multifactor authentication requires two or more verification methods including the Authenticator app, phone, or FIDO2 keys.
Google's 2-Step Verification adds a second layer of identity verification via prompts, security keys, TOTP apps, or backup codes.
Single Sign-On
authenticationCentrally manage workforce access to multiple AWS accounts and applications using SAML 2.0 federation and a built-in identity store.
Seamless single sign-on via Entra ID allows users to authenticate once and access all registered cloud and on-premises applications.
Google Cloud Identity supports SAML-based SSO and third-party IdP integration for unified login across Google Cloud and Workspace.
Temporary Credentials
authenticationAWS Security Token Service issues temporary, limited-privilege credentials via AssumeRole, AssumeRoleWithSAML, or AssumeRoleWithWebIdentity.
Azure Managed Identities automatically acquire and rotate OAuth 2.0 tokens from Entra ID without storing secrets in code.
Allows external workloads to impersonate service accounts and access Google Cloud resources without exporting service account keys.
Resource Hierarchy
organizationAn AWS account is the fundamental isolation boundary containing resources, with its own billing and IAM configuration.
An Azure subscription is a logical container used to provision resources, acting as a billing and access-control boundary.
A Google Cloud project organizes resources, serves as an IAM and billing boundary, and is the base unit of resource ownership.
Organization
organizationCentrally manage multiple AWS accounts with consolidated billing, service control policies (SCPs), and organizational units (OUs).
Organize subscriptions into a hierarchy of management groups for efficient governance, policy, and access management at scale.
The root node of the Google Cloud resource hierarchy, linked to a Cloud Identity domain, providing centralized policy and access control.
Permission Boundary
authorizationAn advanced IAM feature that sets the maximum permissions an IAM entity can have, even if broader policies are attached.
Define repeatable sets of Azure resources, policies, and role assignments that comply with organizational standards and requirements.
Deny policies let you set guardrails that override IAM allow policies, preventing specific principals from using certain permissions.
Audit Logging
complianceRecords API calls and management events across AWS services for governance, compliance, and operational and risk auditing.
Azure Activity Log provides insight into subscription-level events like resource creation, updates, and role assignment changes.
Provides Admin Activity, Data Access, System Event, and Policy Denied logs for who did what, where, and when across GCP.
Secret Management
securityHelps you protect access to applications, services, and IT resources by managing, rotating, and retrieving database credentials, API keys, and other secrets.
Azure Key Vault securely stores and manages secrets, keys, and certificates with access policies and Entra ID-based access control.
A secure and convenient service for storing API keys, passwords, certificates, and other sensitive data with versioning and IAM-based access.
Encryption Key Management
securityKey Management Service creates and controls encryption keys used to encrypt data, integrating with most AWS services for server-side encryption.
Azure Key Vault manages cryptographic keys and supports HSM-backed keys for encrypting Azure resources and custom applications.
Manage cryptographic keys for cloud services, supporting symmetric, asymmetric, and HSM-backed keys for encryption and signing.
Conditional Access
authorizationAWS IAM policy conditions use context keys (IP, time, tags, MFA) to control when a policy grants or denies access.
Entra ID Conditional Access evaluates signals like user, device, location, and risk to enforce access decisions and session controls.
Role bindings can include CEL-based conditions that restrict when permissions are granted based on resource attributes and request context.
Group-Based Access
identityA collection of IAM users that lets you specify permissions for multiple users, simplifying permission management for teams.
Security and Microsoft 365 groups in Entra ID that can be assigned roles and used for resource access management.
Google Groups can be used as principals in IAM policies, enabling group-level permission management across projects and resources.
Access Analyzer
complianceAnalyzes resource policies to identify resources shared with external entities and validates IAM policies against best practices.
Enables regular reviews of user access, group memberships, and role assignments to maintain least-privilege and compliance.
Machine-learning-based recommendations to right-size IAM roles, remove unused permissions, and enforce the principle of least privilege.
Cross-Account / Tenant Access
authorizationIAM roles in one account can be assumed by principals in another account, enabling secure cross-account resource access.
Azure Lighthouse enables cross-tenant management, while Entra ID B2B provides guest user access across tenant boundaries.
Grant IAM roles to identities from other projects or organizations at the resource, project, folder, or org level.
Raw Data
[
{
"concept": "Root / Global Admin",
"category": "identity",
"aws": "Root Account",
"azure": "Global Administrator",
"gcp": "Super Admin"
},
{
"concept": "Admin Role",
"category": "roles",
"aws": "IAMFullAccess / AdministratorAccess",
"azure": "Owner Role",
"gcp": "roles/owner"
},
{
"concept": "Read-Only Access",
"category": "roles",
"aws": "ReadOnlyAccess",
"azure": "Reader Role",
"gcp": "roles/viewer"
},
{
"concept": "Identity Provider",
"category": "identity",
"aws": "AWS IAM",
"azure": "Entra ID (Azure AD)",
"gcp": "Cloud Identity"
},
{
"concept": "Service Identity",
"category": "identity",
"aws": "IAM Role",
"azure": "Managed Identity",
"gcp": "Service Account"
},
{
"concept": "Policy",
"category": "authorization",
"aws": "IAM Policy",
"azure": "Azure Policy",
"gcp": "IAM Policy"
},
{
"concept": "Role-Based Access Control",
"category": "authorization",
"aws": "IAM Policies + Roles",
"azure": "Azure RBAC",
"gcp": "Cloud IAM Roles"
},
{
"concept": "MFA / Multi-Factor Auth",
"category": "authentication",
"aws": "IAM MFA",
"azure": "Entra ID MFA",
"gcp": "2-Step Verification"
},
{
"concept": "Single Sign-On",
"category": "authentication",
"aws": "AWS IAM Identity Center (SSO)",
"azure": "Entra ID SSO",
"gcp": "Cloud Identity SSO"
},
{
"concept": "Temporary Credentials",
"category": "authentication",
"aws": "STS AssumeRole",
"azure": "Managed Identity Token",
"gcp": "Workload Identity Federation"
},
{
"concept": "Resource Hierarchy",
"category": "organization",
"aws": "Account",
"azure": "Subscription",
"gcp": "Project"
},
{
"concept": "Organization",
"category": "organization",
"aws": "AWS Organizations",
"azure": "Management Groups",
"gcp": "GCP Organization"
},
{
"concept": "Permission Boundary",
"category": "authorization",
"aws": "Permissions Boundary",
"azure": "Azure Blueprints",
"gcp": "IAM Deny Policies"
},
{
"concept": "Audit Logging",
"category": "compliance",
"aws": "CloudTrail",
"azure": "Activity Log",
"gcp": "Cloud Audit Logs"
},
{
"concept": "Secret Management",
"category": "security",
"aws": "Secrets Manager",
"azure": "Key Vault (Secrets)",
"gcp": "Secret Manager"
},
{
"concept": "Encryption Key Management",
"category": "security",
"aws": "AWS KMS",
"azure": "Key Vault (Keys)",
"gcp": "Cloud KMS"
},
{
"concept": "Conditional Access",
"category": "authorization",
"aws": "IAM Condition Keys",
"azure": "Conditional Access Policies",
"gcp": "IAM Conditions"
},
{
"concept": "Group-Based Access",
"category": "identity",
"aws": "IAM Groups",
"azure": "Entra ID Groups",
"gcp": "Google Groups"
},
{
"concept": "Access Analyzer",
"category": "compliance",
"aws": "IAM Access Analyzer",
"azure": "Entra ID Access Reviews",
"gcp": "IAM Recommender"
},
{
"concept": "Cross-Account / Tenant Access",
"category": "authorization",
"aws": "Cross-Account Roles",
"azure": "Azure Lighthouse / B2B",
"gcp": "Cross-Project IAM Bindings"
}
]Key Takeaways
- 1IAM concepts map across providers but naming conventions differ significantly.
- 2AWS IAM Policies, Azure RBAC Role Definitions, and GCP IAM Roles serve the same purpose.
- 3Service accounts exist on all platforms but are configured differently.
- 4MFA/2FA enforcement is available across all providers with varying implementation.
- 5Cross-provider identity federation enables single sign-on across clouds.
Frequently Asked Questions
What is the Azure equivalent of an AWS IAM Role?
How do service accounts differ across cloud providers?
Can I use the same identity provider across all three clouds?
What is the equivalent of AWS SCPs in other clouds?
Which cloud has the most granular IAM permissions?
Written by CloudToolStack Team
Cloud engineers and architects with hands-on experience across AWS, Azure, and GCP. We write guides based on real-world production patterns, not just documentation rewrites.
Disclaimer: This guide is for educational purposes. Cloud services change frequently; always refer to official documentation for the latest information. AWS, Azure, and GCP are trademarks of their respective owners.