Difference between revisions of "AWS IAM Access Analyzer"
Jump to navigation
Jump to search
↑ https://aws.amazon.com/about-aws/whats-new/2019/12/introducing-aws-identity-and-access-management-access-analyzer/
(7 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
[[Wikipedia:IAM Access Analyzer]] ([[AWS timeline|Dec 2019]]) <ref>https://aws.amazon.com/about-aws/whats-new/2019/12/introducing-aws-identity-and-access-management-access-analyzer/</ref> helps you identify the resources in your organization and accounts, such as [[Amazon S3 buckets]] or [[IAM roles]], shared with an external entity. | [[Wikipedia:IAM Access Analyzer]] ([[AWS timeline|Dec 2019]]) <ref>https://aws.amazon.com/about-aws/whats-new/2019/12/introducing-aws-identity-and-access-management-access-analyzer/</ref> helps you identify the resources in your organization and accounts, such as [[Amazon S3 buckets]] or [[IAM roles]], shared with an external entity. | ||
* https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html | * https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html | ||
+ | * https://aws.amazon.com/iam/access-analyzer/ | ||
+ | * <code>[[aws accessanalyzer]]</code> | ||
+ | * <code>[[aws accessanalyzer create-analyzer]]</code> | ||
+ | * Pricing: $0.20 /IAM role or user analyzed/month | ||
== Related == | == Related == | ||
+ | * [[Amazon GuardDuty S3 protection]] | ||
* [[AWS CloudTrail]] | * [[AWS CloudTrail]] | ||
* [[KICS execution example]] | * [[KICS execution example]] | ||
* [[IAM Access Analyzer should be enabled and configured to continuously monitor resource permissions]] | * [[IAM Access Analyzer should be enabled and configured to continuously monitor resource permissions]] | ||
+ | * [[Datadog medium: AWS IAM role has administrative privileges]] | ||
− | ==See also== | + | == See also == |
+ | * {{AWS IAM Access Analyzer}} | ||
* {{IAM}} | * {{IAM}} | ||
− | |||
[[Category:AWS]] | [[Category:AWS]] |
Latest revision as of 09:01, 28 June 2024
Wikipedia:IAM Access Analyzer (Dec 2019) [1] helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, shared with an external entity.
- https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html
- https://aws.amazon.com/iam/access-analyzer/
aws accessanalyzer
aws accessanalyzer create-analyzer
- Pricing: $0.20 /IAM role or user analyzed/month
Related[edit]
- Amazon GuardDuty S3 protection
- AWS CloudTrail
- KICS execution example
- IAM Access Analyzer should be enabled and configured to continuously monitor resource permissions
- Datadog medium: AWS IAM role has administrative privileges
See also[edit]
- AWS IAM Access Analyzer:
aws accessanalyzer
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: