Identity & Access Managment

AWS IAM controls access across AWS services, with risks centered on excessive permissions, weak policies, and lack of governance.

IAM defines who can access what within AWS. Overly permissive roles, poor policy design, and lack of auditing can lead to widespread compromise. Least privilege and continuous review are essential.

Identity & Access Managment Documentation

IAM Users Password Policy Requires Special Characters
advisory
aws iam

IAM Users Password Policy Requires Special Characters

The use of special characters in passwords is not recommended.

IAM Users Password Policy Requires at Least 8 Characters
high
aws iam

IAM Users Password Policy Requires at Least 8 Characters

AWS IAM user passwords should require at least 8 characters and include a variety of character types.

IAM Users Password Policy Remembers Less Than 3 Previous Passwords
high
aws iam

IAM Users Password Policy Remembers Less Than 3 Previous Passwords

AWS Account Password Policies should prevent users from utilizing previous passwords.

IAM Users Password Policy Not Set
moderate
aws iam

IAM Users Password Policy Not Set

AWS accounts should have a custom password policy rather than relying on the default password policy.

IAM Users Password Policy Forces a Hard Password Expiry
high
aws iam

IAM Users Password Policy Forces a Hard Password Expiry

AWS Account Password Policy should not require hard password resets, where passwords are reset only by an administrator.

IAM Users Password Policy Expires Passwords
moderate
aws iam

IAM Users Password Policy Expires Passwords

IAM user passwords should not expire.

IAM Users Password Policy Does Not Allow Users to Change Passwords
moderate
aws iam

IAM Users Password Policy Does Not Allow Users to Change Passwords

AWS account password policies should allow users to change their own passwords.

IAM Users Password Policy Allows 8-15 Characters with Limited Characters
moderate
aws iam

IAM Users Password Policy Allows 8-15 Characters with Limited Characters

AWS IAM user passwords should include all variations of characters if the password is less than 15 characters.

IAM User Without MFA
high
aws iam

IAM User Without MFA

AWS IAM Users should have MFA enabled and active.

IAM User Inactive
low
aws iam

IAM User Inactive

AWS IAM users that are inactive should be deleted

IAM User has Multiple Access Keys
low
aws iam

IAM User has Multiple Access Keys

AWS IAM Users should have a single Access Key and not multiple Access Keys.

IAM User Has Inactive Access Keys
moderate
aws iam

IAM User Has Inactive Access Keys

AWS IAM Users should not have long-term inactive Access Keys

IAM User Approaching User Access Key Limit
low
aws iam

IAM User Approaching User Access Key Limit

AWS IAM Users have a per user limit for Access Keys, hitting this limit interferes with the ability to cycle Access Keys and contributes to the overall acount Access Key Limit

IAM User Access Keys Unused
moderate
aws iam

IAM User Access Keys Unused

AWS IAM Users should not have unused Access Keys.

AWS Root User Does Not Have MFA
critical
aws iam

AWS Root User Does Not Have MFA

The AWS Root User should have an MFA device enabled and active.

AWS Account Approaching Access Key Limit
low
aws iam

AWS Account Approaching Access Key Limit

AWS Accounts have a limit on the number of Access Keys they can issue. This should be monitored and managed to prevent reaching the limit, which can block regular key rotation processes.

Account Root User Has Signing Certificates
high
aws iam

Account Root User Has Signing Certificates

AWS root account users should not have attached Signing Certificates.

Account Root User Has Access Keys Issued
critical
aws iam

Account Root User Has Access Keys Issued

The AWS Root Account User should not utilise Access Keys.