How Does Authorization Work When Multiple Access Control Mechanisms Co-Exist?

Figure 1 Authorization process

Figure 2 is a matrix of the IAM policies, bucket policies, and ACLs (allow and deny effects).

Figure 2 Matrix of the IAM policies, bucket policies, and ACLs (allow and deny effects)