Skip to main content

Monitoring IAM Roles

The IAM roles help to assign permissons to the trusted IAM users or other IAM roles. IAM roles are also used to establish the trust relationship with other accounts. Obviously, this has third-party risk-management implications, and all third-party access should be reviewed.

All IAM roles details

This view helps cloud team to get the details such as all available IAM roles in cloud, the last used region and time, and what policies are attached to the role.

all IAM roles

Cross account roles

This view helps cloud admin to identify all IAM roles which trust other AWS accounts.

With AWS IAM, you can grant other AWS customers access to perform actions in your account. Obviously, this has third-party risk-management implications, and all third-party access should be reviewed.

note

Within an AWS organization, there are often a lot of cross-account trusts. Various accounts are created to audit configuration, write logs, perform auto-remediation tasks, or deploy resources via a centralized pipeline. These are not third-party risks.

cross account IAM roles

Unused IAM roles

This view helps cloud admin to identify all IAM roles which have not been used since last 90 days.

Periodically ensuring that all the resources you’ve created are still being used can reduce operational complexity by eliminating the need to track unnecessary resources. It also improves security: identifying unused IAM roles helps reduce the potential for improper or unintended access to your critical infrastructure and workloads.

unused iam roles

Roles without policies

This view helps cloud admin to identify all IAM roles without any attached policy.

iam roles without policies