Difference between revisions of "AWS IAM Access Analyzer"
Jump to navigation
Jump to search
↑ https://aws.amazon.com/about-aws/whats-new/2019/12/introducing-aws-identity-and-access-management-access-analyzer/
(Created page with "Wikipedia:IAM Access Analyzer ==See also== *{{AWS}} *Category:AWS") |
|||
(19 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | [[Wikipedia:IAM Access Analyzer]] | + | [[Wikipedia:IAM Access Analyzer]] ([[AWS timeline|Dec 2019]]) <ref>https://aws.amazon.com/about-aws/whats-new/2019/12/introducing-aws-identity-and-access-management-access-analyzer/</ref> helps you identify the resources in your organization and accounts, such as [[Amazon S3 buckets]] or [[IAM roles]], shared with an external entity. |
+ | * https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html | ||
+ | * https://aws.amazon.com/iam/access-analyzer/ | ||
+ | * <code>[[aws accessanalyzer]]</code> | ||
+ | * <code>[[aws accessanalyzer create-analyzer]]</code> | ||
+ | * Pricing: $0.20 /IAM role or user analyzed/month | ||
− | == | + | == Related == |
− | * | + | * [[Amazon GuardDuty S3 protection]] |
+ | * [[AWS CloudTrail]] | ||
+ | * [[KICS execution example]] | ||
+ | * [[IAM Access Analyzer should be enabled and configured to continuously monitor resource permissions]] | ||
+ | * [[Datadog medium: AWS IAM role has administrative privileges]] | ||
− | *[[Category:AWS]] | + | == See also == |
+ | * {{AWS IAM Access Analyzer}} | ||
+ | * {{IAM}} | ||
+ | |||
+ | [[Category:AWS]] |
Latest revision as of 09:01, 28 June 2024
Wikipedia:IAM Access Analyzer (Dec 2019) [1] helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, shared with an external entity.
- https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html
- https://aws.amazon.com/iam/access-analyzer/
aws accessanalyzer
aws accessanalyzer create-analyzer
- Pricing: $0.20 /IAM role or user analyzed/month
Related[edit]
- Amazon GuardDuty S3 protection
- AWS CloudTrail
- KICS execution example
- IAM Access Analyzer should be enabled and configured to continuously monitor resource permissions
- Datadog medium: AWS IAM role has administrative privileges
See also[edit]
- AWS IAM Access Analyzer:
aws accessanalyzer
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: