IAM is eventually consistent. And they do a lot of derivations of hashing off an original signature and distributing individual, bespoke versions to services in different regions to limit the blast radius of a compromised credential.
If you go to an AWS event in the future, the name of the chalk talk was "The Life of an IAM Policy"