The Access Key portion of the credentials.
The encryption keys used to encrypt data.
The secret key used to sign requests.
The identifier for the user.