Skip to main content

πŸ“ AWS IAM

  • Contextual name: πŸ“ IAM
  • ID: /ce/ca/aws/iam

Policies (17)​

PolicyLogic CountFlagsCompliance
πŸ›‘οΈ Account Has No IAM UsersπŸ”΄πŸŸ 1πŸ”΄ x3, 🟠 x5no data
πŸ›‘οΈ Account Root User has active access keys🟒1🟒 x6no data
πŸ›‘οΈ Account Root User Hardware MFA is not enabled.🟒βšͺ🟒 x2, βšͺ x1no data
πŸ›‘οΈ Account Root User MFA is not enabled.🟒1🟒 x6no data
πŸ›‘οΈ AWS IAM User is not managed centrally in multi-account environments🟒βšͺ🟒 x2, βšͺ x1no data
πŸ›‘οΈ AWSCloudShellFullAccess Policy is attached🟒1🟒 x6no data
πŸ›‘οΈ IAM Role Unused🟒1🟒 x6no data
πŸ›‘οΈ Policy (Customer Managed) Contains Potential Credentials ExposureπŸ”΄πŸŸ 1πŸ”΄ x3, 🟠 x5no data
πŸ›‘οΈ Policy allows full administrative privileges🟒1🟒 x6no data
πŸ›‘οΈ Root User credentials were used is the last 30 days🟒1🟒 x6no data
πŸ›‘οΈ Server Certificate is expired🟒1🟒 x6no data
πŸ›‘οΈ User Access Keys are not rotated every 90 days or less🟒1🟒 x6no data
πŸ›‘οΈ User has inline or directly attached policies🟒1🟠 x1, 🟒 x5no data
πŸ›‘οΈ User has more than one active access key🟒1🟒 x6no data
πŸ›‘οΈ User MFA is not enabled for all users with console password🟒1🟒 x6no data
πŸ›‘οΈ User with console and programmatic access set during the initial creation🟒βšͺ🟒 x2, βšͺ x1no data
πŸ›‘οΈ User with credentials unused for 45 days or more is not disabled🟒1🟒 x6no data