Skip to main content

πŸ“ AWS IAM

  • Contextual name: πŸ“ IAM
  • ID: /ce/ca/aws/iam
  • Located in: πŸ“ AWS

Policies (17)​

PolicyLogic CountFlags
πŸ“ Account Has No IAM Users πŸ”΄πŸŸ 1πŸ”΄ x3, 🟠 x5
πŸ“ Account Root User has active access keys 🟒1🟒 x6
πŸ“ Account Root User Hardware MFA is not enabled. 🟒🟒 x3
πŸ“ Account Root User MFA is not enabled. 🟒1🟒 x6
πŸ“ AWS IAM User is not managed centrally in multi-account environments 🟒🟒 x3
πŸ“ AWSCloudShellFullAccess Policy is attached 🟒1🟒 x6
πŸ“ IAM Role Unused 🟒1🟒 x6
πŸ“ Policy (Customer Managed) Contains Potential Credentials Exposure πŸ”΄πŸŸ 1πŸ”΄ x3, 🟠 x5
πŸ“ Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ Root User credentials were used is the last 30 days πŸ”΄πŸŸ’1πŸ”΄ x1, 🟒 x6
πŸ“ Server Certificate is expired 🟒1🟒 x6
πŸ“ User Access Keys are not rotated every 90 days or less 🟒1🟒 x6
πŸ“ User has inline or directly attached policies 🟒1🟠 x1, 🟒 x5
πŸ“ User has more than one active access key 🟒1🟒 x6
πŸ“ User MFA is not enabled for all users with console password 🟒1🟒 x6
πŸ“ User with console and programmatic access set during the initial creation 🟒🟒 x3
πŸ“ User with credentials unused for 45 days or more is not disabled 🟒1🟒 x6