ABAC for individual resources
IAM Identity Center users and IAM roles support attribute-based access control (ABAC), which allows you to define access to operations and resources based on tags. ABAC helps reduce the need to update permission policies and helps you to base access off of employee attributes from your corporate directory. If you are already using a multi-account strategy, ABAC can be used in addition to role-based access control (RBAC) to provide multiple teams operating in the same account granular access to different resources. For example, IAM Identity Center users or IAM roles can include conditions to limit access to specific Amazon EC2 instances which otherwise would have to be explicitly listed in each policy in order to access them.
Since an ABAC authorization model depends on tags for access to operations and
resources, it is important to provide guardrails to prevent unintended access. SCPs can be
used to protect tags across your organization by only allowing tags to be modified under
certain conditions. The blogs Securing resource tags used for authorization using a service control policy in
AWS Organizations
Where long-lived Amazon EC2 instances are being used to support more traditional operations
practices then this approach can be utilized, the blog Configure IAM Identity Center ABAC for Amazon EC2 instances and Systems Manager Session Manager
To learn about services that support ABAC, see AWS services that work with IAM.