Skip to main content

AWS IAM

The AWS IAM Analyzer provides detailed insights into Identity and Access Management within your AWS environment. It helps identify excessive privileges, unused roles, cross-account access risks, and policy misconfigurations across users, groups, and roles.

Required Blueprints: AWS, Okta



Sightlines

SightlineDescription
IAM RolesSurfaces role usage, excessive permissions, admin access, and cross-account role configurations.
IAM UsersProvides visibility into users with excessive privileges, admin access, unused accounts, and MFA status.
IAM Identity CenterMonitors IAM Identity Center instances, users, and groups within centralized authentication, with region-based distri...
IAM GroupsMonitors group configurations, admin access, and policy associations.
IAM PoliciesTracks policy usage, admin access grants, wildcard permissions, and assume-role configurations.
IAM Inline PoliciesMonitors inline policies attached to roles, users, or groups to ensure least privilege adherence.
IAM Password PoliciesEnsures password configurations comply with security best practices such as the AWS CIS Foundations Benchmark.
IAM Access KeysProvides visibility into access key status, rotation, usage trends, and users with unused keys.
IAM Policies for StorageMonitors admin policies attached to storage services (S3, DynamoDB, RDS, Redshift).
IAM Policies for StreamingMonitors admin policies attached to streaming services (SNS, Kinesis, SQS).
IAM Policies for ComputeMonitors admin policies attached to compute services (Lambda, ECS, EC2, ELB, ECR).
IAM Policies for CloudWatchMonitors admin policies attached to CloudWatch and CloudWatch Logs resources.
IAM Users Password PoliciesMonitors user password status, MFA compliance, and access denied events.
IAM Users Access PatternsSurfaces user login and activity patterns including inactive users, cross-account access, and resource access history.
IAM Users Access KeysProvides visibility into access key status per user, including dual keys, unused keys, and key distribution.
IAM Access to KMSTracks KMS access permissions across users, groups, and roles.
IAM Service-Linked RolesMonitors service-linked roles to ensure only necessary permissions are granted.
IAM Across SystemsTracks user permissions spread across various AWS services.
IAM Policy Impact AnalysisIdentifies policies attached to resources and orphaned policies not attached to any resource.
IAM Access to CloudTrailMonitors who has access to CloudTrail logs across users, groups, and roles.
IAM Managed PoliciesTracks managed policies and their adherence to the principle of least privilege.
User Impact AnalysisProvides a comprehensive view of user impact across the AWS environment, highlighting excessive permissions and unusu...

Explorer Node Types

Use these node types in Explorer or KAI to query resources surfaced by this analyzer:

aws.iam.User, aws.iam.Role, aws.iam.Group, aws.iam.Policy, aws.iam.PolicyInline, aws.iam.AccessKey, aws.iam.PasswordPolicy, aws.identitystore.User, aws.identitystore.Group


  • AWS Compute — EC2 instance profiles and IAM role associations
  • AWS Storage — S3 bucket policies and IAM-based access control
  • AWS RDS — Database IAM authentication
  • AWS Network — VPC/subnet access controlled by IAM policies
  • AWS Streaming — Admin policies on SNS, Kinesis, and SQS

Insight Feed Alerts

  • Unauthorized Access Attempts: Flags suspicious login attempts such as failed login spikes or logins from unusual locations.
  • Inactive Users Detected: Identifies accounts inactive for a set period that could be targets for attackers.
  • Users Without MFA: Highlights users without multi-factor authentication enabled.
  • Deprovisioned Users Activity: Monitors access attempts by deprovisioned users.
  • Admin Role Misuse: Triggers on unusual activity related to users with administrative privileges.
  • Unused IAM Roles: Identifies IAM roles not being actively used.
  • IAM Roles with Wildcard Access: Flags roles granting wildcard access (e.g., "Action": "*").
  • IAM Roles with Cross-Account Access: Flags roles with cross-account permissions that could enable privilege escalation.
  • Expired IAM Passwords: Monitors users with expired passwords.
  • Unrotated IAM Access Keys: Identifies access keys not rotated within a specified time frame.
  • IAM Users with Weak Passwords: Flags users whose passwords do not meet security standards.
  • Service Account with Admin Access: Identifies service accounts with excessive admin privileges.
  • Users without Groups: Highlights users not assigned to any groups.
  • Users with Admin Access: Flags users with direct admin access.
  • Users with Unused Access Keys: Identifies users with access keys not used within a specified period.
  • Users with Elevated Privileges via IAM Policies: Identifies users with overly permissive policy-based access.
  • IAM Policies that Allow Wildcard Resource Access: Flags policies allowing wildcard access to resources.
  • IAM Policies Attached to Critical Resources: Monitors policies granting admin access to critical resources.
  • IAM Users with Inline Policies: Identifies users with inline policies that may provide excessive permissions.
  • IAM Policies for High-Risk Resources: Identifies admin-level access policies for high-risk resources like S3, EC2, and Lambda.
  • IAM Policies Allowing Cross-Service Role Assumption: Flags policies allowing cross-service role assumption.
  • IAM Policies Violating Least Privilege Principle: Identifies policies granting unnecessary access.
  • IAM Roles with Full Access to Sensitive Services: Identifies roles with full access to KMS, CloudTrail, or IAM.
  • IAM Access to KMS: Monitors entities with direct or indirect access to AWS KMS.
  • IAM Users with CloudTrail Access: Identifies users and groups with access to CloudTrail logs.
  • IAM Users Accessing Unused Resources: Identifies users accessing unused or underutilized resources.
  • IAM Roles with Broad Permissions: Identifies roles granting broad permissions across services.