AWS Misconfigurations
IAM Audit
Checks performed
- AWS Account Should Have A Minimum Number of Admins
- AWS Account Should Not Have Too Many Admins
- ELB Certificates Should Be Rotated
- Groups Without Users Should Be Removed
- Blocked KMS Actions In IAM Policies Should Be Set
- Blacklisted IAM Policies Should Be Checked
- Blocked KMS Actions In Inline Policies Should Be Set
- IAM Custom Role Policies Should Not Be Present
- Complex Password Policy Should Be Present
- Inactive Roles Should Be Removed
- Roles Should Not Have Inline Policies
- Role Service Inactivity
- Root Account Should Have MFA and External ID Set
- Root Account Access Keys Should Be Rotated
- Root Account Should Not Have Access Keys
- Root Account Activity Should Be Monitored
- Root Account Certificates Should Be Rotated
- Certificates Should Not Be Tied With Root Account
- Root Account Should Have MFA
- Root Account Should Have Password Rotation
- Root Account Password Should Be Rotated
- Access Keys For Root Account
- User Account Without Any Usage Should Be Removed
- User Account Access keys Should Be Rotated
- Inactive User Account Access keys Should Be Dropped
- User Account Certificates Should Be Rotated
- User Console Access Inactive
- Users Should Not Have Inline Policies
- MFA Should Be Enabled On User Accounts
- User Account Service Inactivity
- User Account Should Not Have Multiple Access Keys