Search result for 'IAM'
- Most recent
- Most popular
- Most linked
- Most download
- Favorited
Evaluate the AWS account password policy for IAM users against the specified requirements; return NON_COMPLIANT if the policy does not meet all defined criteria. Tabulate the results.Evaluates AWS IAM password policy against specified criteria and tabulates the results. |
|
Identify non-compliant IAM users and reasons for non-complianceIdentifies IAM users who are non-compliant with the password policy and lists them. |
|
List AWS IAM users with console passwords which do not have Multi-Factor Authentication (MFA) enabled, categorize them based on MFA Enabled or not and if they are compliant or not based on this rule.This script lists AWS IAM users with console passwords and checks if they have MFA enabled, categorizing them based on compliance. |
|
Check AWS account compliance based on root user access key existenceChecks if the AWS account is compliant based on the existence of root user access keys. |
|
Check if the root user access key exists in the AWS accountChecks if the AWS account is compliant based on the existence of root user access keys using account summary. |
|
List all AWS IAM users and retrieve their last used date for passwords and access keys.Lists all AWS IAM users and retrieves their last used date for passwords and access keys, handling timezone differences. |
|
Identify AWS IAM users with passwords or access keys that have not been used in the last 90 days.Identifies AWS IAM users with passwords or access keys not used in the last 90 days and lists them as non-compliant. |
|
Determine compliance status based on the usage of AWS IAM user credentials, marking as NON_COMPLIANT if any credentials are inactive beyond 90 days.Determines compliance status based on AWS IAM user credentials usage, marking as NON_COMPLIANT if any credentials are inactive beyond 90 days. |
|
Tabulate the results of the compliance evaluation for AWS IAM users.Tabulates the compliance evaluation results for AWS IAM users, marking non-compliant users. |
|
Evaluate all AWS IAM users and identify any with passwords or active access keys that have not been used within the specified number of days (default: 90 days); return NON_COMPLIANT if any user credentials are inactive beyond this threshold. Tabulate the results.Evaluates AWS IAM users for inactive credentials and tabulates the results. |
|
Retrieve a list of all active AWS IAM access keys.Retrieves and prints a list of all active AWS IAM access keys. |
|
For each active AWS IAM access key, determine the last rotation date.Determines the last rotation date for each active AWS IAM access key using the creation date. |
|
Compare the last rotation date of each access key with the specified maxAccessKeyAge (default: 90 days) to identify keys that have not been rotated within this period.Identifies AWS IAM access keys that have not been rotated within the specified maxAccessKeyAge days, fixing datetime comparison issue. |
|
Return NON_COMPLIANT for any access key that exceeds the maxAccessKeyAge threshold.Returns and prints NON_COMPLIANT status for access keys exceeding the maxAccessKeyAge threshold. |
|
Tabulate the results of the compliance check, indicating which keys are compliant and which are non-compliant.Tabulates the compliance check results for IAM access keys, indicating non-compliant keys. |
|
Evaluate all active AWS IAM access keys and identify any that have not been rotated within the specified maxAccessKeyAge days (default: 90 days); return NON_COMPLIANT if any key exceeds this age threshold. Tabulate the results.Evaluates IAM access keys for compliance with rotation policy and tabulates results. |
|
Evaluate all AWS IAM users and identify any users with directly attached policiesEvaluates IAM users for directly attached policies and tabulates the results. |
|
Audit of AWS IAM Users for MFA ComplianceThe workflow involves listing AWS IAM users who have console passwords and checking if they have Multi-Factor Authentication (MFA) enabled. Users are then categorized based on whether MFA is enabled or not. The categorization helps in identifying users who are compliant with the security rule of having MFA enabled. This process ensures that all users with console access are adhering to securit... |
|
AWS Account Compliance Check for Root User Access KeyThis workflow involves verifying the compliance of an AWS account by checking for the existence of access keys associated with the root user. The process ensures that security best practices are followed by identifying any potential security risks related to root user access keys. By conducting this check, the workflow aims to enhance the overall security posture of the AWS account. It helps i... |
|
Audit of AWS IAM User Credential ActivityThe workflow involves evaluating all AWS IAM users to identify any with passwords or active access keys that have not been used within a specified number of days, defaulting to 90 days. If any user credentials are found to be inactive beyond this threshold, they are marked as NON_COMPLIANT. The results of this evaluation are then tabulated for further analysis. This process ensures that only a... |
|