Problem Statement
Why is Identity and Access Management (IAM) critical in cloud security?
Explanation
In cloud environments, resources are often accessible via APIs and through identities rather than physical boundaries. IAM allows you to define who can do what, in which context, and under what conditions. Mis-configured IAM can lead to over-privileged users or service accounts, which become a major attack path. Knowing how to design least-privilege IAM, configure roles, policies and service-principals is a strong interview topic.
