IAM hardening follow-up
Topic: Cloud aws core
Summary
After basic IAM setup, reduce risk with permission boundaries, SCPs, and regular audit. Use when you want to tighten IAM beyond least privilege and MFA.
Intent: How-to
Quick answer
- Permission boundaries cap what an IAM identity can do. Set on user or role. Use to delegate without granting full power.
- Service Control Policies (SCPs) in Organizations restrict what accounts can do. Use to deny regions or risky actions across OU.
- Audit with IAM Access Analyzer and credential report. Remove unused permissions and credentials. Rotate and use short-lived credentials.
Prerequisites
Steps
-
Permission boundaries
Create policy that defines max permissions. Attach as permission boundary to role or user. Identity cannot exceed boundary.
-
SCPs if using Organizations
Attach SCP to OU or account. Deny list or allow list. Test in non-prod first.
-
Audit and trim
Run credential report. Use Access Analyzer. Remove unused; rotate keys; prefer roles over long-lived keys.
Summary
Tighten IAM with permission boundaries, SCPs, and regular audit. Remove unused permissions and credentials.
Prerequisites
Steps
Step 1: Permission boundaries
Create policy for max permissions. Attach as permission boundary. Identity cannot exceed boundary.
Step 2: SCPs if using Organizations
Attach SCP to OU or account. Deny or allow list. Test in non-prod first.
Step 3: Audit and trim
Credential report. Access Analyzer. Remove unused; rotate keys; prefer roles.
Verification
- Boundaries and SCPs in place. Audit run. Unused permissions removed.
Troubleshooting
Too restrictive — Adjust boundary or SCP. Missing permission — Add to policy within boundary.