When a request is made, AWS policy evaluation starts by checking if any explicit deny matches the request. If yes, access is denied immediately. If no explicit deny is found, it checks for explicit allow. If an allow matches, access is granted. If neither deny nor allow matches, access is denied by default. This logic ensures that deny rules always override allow rules, providing a secure default. The execution table shows this step-by-step with a request to get an object from an S3 bucket. The variable tracker shows the access decision changing from none to deny after the explicit deny is found. Key moments clarify why evaluation stops on deny and what happens if no rules match. The visual quiz tests understanding of these steps.