Using IAM to Secure the Whole