AWS IAM#
Version: 1.0.1 · Category: AWS Cloud Security · Plan: Base+
A comprehensive IAM security analysis integration covering user and role inventory, policy inspection, access key management, permission boundary analysis, and security risk detection.
Tools#
list_users — User list#
List all IAM users with status fields:
- Password and access key last used times
- MFA device status
- Groups and group count
- Access key count
get_user_details — User details#
Retrieve the full configuration for a specific user:
- Attached managed policies
- Inline policy names
- Groups
- MFA devices
- Active access keys and status
list_roles — Role list#
List all IAM roles, including:
- Role name and ARN
- Creation time
- Assume Role policy (trust policy) document
get_role_details — Role details#
Retrieve the full configuration for a role:
- Attached managed policies
- Inline policy names
- Trust policy (which principals can assume this role)
list_policies — Policy list#
List IAM policies with scope filtering:
scope parameter |
Description |
|---|---|
Local |
Only customer-managed policies |
AWS |
Only AWS-managed policies |
All |
All policies |
get_policy_details — Policy details#
Retrieve a policy's full text and version history.
analyze_user_permissions — User effective permissions analysis#
Aggregate all effective permissions for a specified user from all sources:
- Directly attached managed policies
- Inline policies
- Group memberships
- Group policies
Returns a complete list of allowed actions.
check_inactive_users — Inactive user detection#
Detect users who have not used their console passwords or access keys within a specified number of days.
| Parameter | Default | Description |
|---|---|---|
days_threshold |
90 | Inactive threshold (days) |
check_access_keys — Access key health check#
Comprehensive access key audit:
- Key age
- Last used time and service
- Rotation recommendations
check_mfa_compliance — MFA compliance check#
Detect IAM users without MFA enabled — focus on users with console access.
find_admin_users — Admin user list#
Identify users with AdministratorAccess managed policy or equivalent *:* full permissions attached.
check_password_policy — Password policy#
View the account's IAM password policy settings — check minimum length, complexity, expiry, and reuse restrictions.
find_roles_with_external_trust — External trust role detection#
Detect IAM roles trusted by non-current-account principals:
- Cross-account trust (other AWS account IDs)
- External trust (trust to federated identity providers or third-party services)
check_permission_boundaries — Permission boundary analysis#
Audit permission boundary configurations for all users and roles — identify identities with boundaries set and their effective permission scope.
get_account_summary — Account summary#
Retrieve account-level IAM configuration statistics:
- Number of users, groups, roles, policies
- MFA enable rate
- Whether the root account uses MFA
Configuration#
| Item | Description |
|---|---|
AWS_ACCESS_KEY_ID |
Access Key ID |
AWS_SECRET_ACCESS_KEY |
Secret Access Key |
AWS_DEFAULT_REGION |
Default region (e.g. us-east-1) |
AWS_SESSION_TOKEN |
Optional: temporary session token |
Investigation workflow#
1. get_account_summary
→ Get an overview of account-wide IAM configuration risk
2. check_mfa_compliance
→ Identify users without MFA enabled (priority action)
3. find_admin_users
→ List all users with admin privileges
4. check_access_keys
→ Identify access keys that are too old and should be rotated
5. analyze_user_permissions username:"<suspicious user>"
→ Get the full effective permission list for a specific user
6. find_roles_with_external_trust
→ Confirm which roles can be assumed by external accounts or identities