IAM

36

Resources

74

Total Findings

122

Rules Executed

37

Unique Rules

0

Exception

60.517s

Timespent

Summary

Filter

rootMfaActive

Security
Description
Root user can perform sensitive operations in your account, adding an additional layer of authentication helps you to better secure your account. You have NOT enabled Multi-Factor Authentication (MFA) on your root user. AWS MFA is a simple best practice that adds an extra layer of protection on top of your user name and password. With MFA enabled, when a user signs in to an AWS Management Console, they will be prompted for their user name and password (the first factor—what they know), as well as for an authentication code from their AWS MFA device (the second factor—what they have). Taken together, these multiple factors provide increased security for your AWS account settings and resources.
Resources
GLOBAL: User::root_id
Label
Cost Incurred (maybe)
Recommendation
AWS MFA
IAM Best Practices

userNotUsingGroup

Operation Excellence
Description
1 users are not within user groups. An IAM user group is a collection of IAM users. User groups let you specify permissions for multiple users, which can make it easier to manage the permissions for those users.
Resources
GLOBAL: User::kuettai
Recommendation
IAM Group

InlinePolicy

Operation Excellence
Description
You have set an inline policy for 21 IAM users, groups or roles. An inline policy is a policy that's embedded in an IAM identity (a user, group, or role). In most cases, we recommend that you use managed policies instead of inline policies. This is because managed policies have several additional features such as reusability, central change management, versioning and rolling back, delegating permissions management and automatic updates. Inline policies are useful if you want to maintain a strict one-to-one relationship between a policy and the identity that it's applied to. For example, you want to be sure that the permissions in a policy are not inadvertently assigned to an identity other than the one they're intended for.
Resources
GLOBAL: User::kuettai | Role::AccessAnalyzerTrustedService | Role::AVMContainersUserRole | Role::awslogs.prod.kelex.molecule.toppatterns | Role::CloudSecAuditRole | Role::CloudSeerTrustedServiceRole | Role::CodeGuruProfilerForwardToAmazonProfiler | Role::CodeStarWorker-dojo-CloudFormation | Role::CodeStarWorker-dojo-ToolChain | Role::CodeStarWorker-dojo-WebApp | Role::Cognito_dojoIdPAuth_Role | Role::Cognito_dojoIdPUnauth_Role | Role::DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08 | Role::EC2AdminRole | Role::IMDSv2-automigrator | Role::OrthancRole | Role::PACICloudFormationStackSetAdministrationRole | Role::SaltyTrustedService | Role::ServiceScreenerAssumeRole | Role::ShadowTrooperRole | Role::TurtleRoleManagement
Recommendation
AWS Docs

roleLongSession

Security
Description
3 role session duration is longer than the default duration of 60 minutes. Unless your applications and/or federated users need to complete longer running workloads in a single session, it is recommended to stick with the default session duration.
Resources
GLOBAL: Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98 | Role::itadmin | Role::ServiceScreenerAssumeRole
Label
Testing Required (maybe)
Recommendation
AWS Blog

FullAdminAccess

Security
Description
You have provided full Administrator access to 8 users, groups or roles. It is considered best practice to limit access by following the standard security advice of granting least privilege, or granting only the permissions required to perform a task. Determine what users and roles need to do and then craft policies that allow them to perform only those tasks.
Resources
GLOBAL: Role::AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98 | Role::DojoEC2AdminRole | Role::EC2AdminRole | Role::itadmin | Role::OrganizationAccountAccessRole | Role::PACICloudFormationStackSetExecutionRole | Role::ServiceScreenerAutomationRole | Role::stacksets-exec-7ca18804340a75b25a831ca17fba8659
Recommendation
AWS Docs
Organization GuardRail Blog

ManagedPolicyFullAccessOneServ

Security
Description
You have set a managed policy giving 2 users, groups and/or roles full access to one service. It is considered best practice to limit access by following the standard security advice of granting least privilege, or granting only the permissions required to perform a task. Determine what users and roles need to do and then craft policies that allow them to perform only those tasks.
Resources
GLOBAL: Role::CodeStarWorker-dojo-ToolChain | Role::OrthancRole
Recommendation
AWS Docs

InlinePolicyFullAccessOneServ

Security
Description
You have set an inline policy giving 2 users, groups and/or roles full access to one service. Consider switching to managed policies instead. It is also considered best practice to limit access by following the standard security advice of granting least privilege, or granting only the permissions required to perform a task. Determine what users and roles need to do and then craft policies that allow them to perform only those tasks.
Resources
GLOBAL: Role::Cognito_dojoIdPAuth_Role | Role::Cognito_dojoIdPUnauth_Role
Recommendation
AWS Docs

enableCURReport

Cost Optimization
Description
Cost and Usage Reports (CUR) has not been setup in this accounts. Setup CUR for better cost analysis.
Resources
GLOBAL: Account::Config
Label
Cost Incurred
Recommendation
Creating Cost and Usage Reports

PartialEnableConfigService

Security
Description
Not all regions has Config enabled. The AWS Config service performs configuration management of supported AWS resources in your account and delivers log files to you. The recorded information includes the configuration item (AWS resource), relationships between configuration items, and any configuration changes between resources.
Resources
GLOBAL: Account::Config
Label
Cost Incurred
Recommendation
Enable AWS Config

hasAlternateContact

Security
Description
Alternate account contacts help AWS get in contact with the appropriate personnel if needed. Configure the account’s alternate contacts to point to a group rather than an individual. For example, create separate email distribution lists for billing, operations, and security and configure these as Billing, Security, and Operations contacts in each active AWS account. This ensures that multiple people will receive AWS notifications and be able to respond, even if someone is on vacation, changes roles, or leaves the company.
Resources
GLOBAL: Account::Config
Recommendation
Alternate Contact

enableCostBudget

Cost Optimization
Description
AWS Budgets enable monitoring of monthly costs and usage with notifications when costs are forecasted to exceed target thresholds. Forecasted cost notifications can provide an indication of unexpected activity, providing extra defense in addition to other monitoring systems, such as AWS Trusted Advisor and Amazon GuardDuty. Monitoring and understanding your AWS costs is also part of good operational hygiene.
Resources
GLOBAL: Account::Config
Recommendation
Create a budget

passwordPolicy

Security
Description
You have not set a custom password policy. Setting a custom password policy will allow you to have the ability to require strong password practices, such as complexity level, avoiding re-use, and enforcing multi-factor authentication (MFA). If you don't set a custom password policy, IAM user passwords must meet the default AWS password policy.
Resources
GLOBAL: Account::Config
Recommendation
IAM Password Policy

supportPlanLowTier

Operation Excellence
Description
It is recommended that you subscribe to the AWS Business Support tier or higher for all of your AWS production accounts. For more information, refer to Compare AWS Support Plans. If you don't have premium support, you must have an action plan to handle issues which require help from AWS Support. AWS Support provides a mix of tools and technology, people, and programs designed to proactively help you optimize performance, lower costs, and innovate faster. AWS Business Support provides additional benefits including access to AWS Trusted Advisor and AWS Personal Health Dashboard and faster response times.
Resources
GLOBAL: Account::Config
Label
Cost Incurred
Recommendation
AWS Support Plan
Guide
Detail
GLOBAL

1. root_id

CheckCurrent ValueRecommendation
rootMfaActive Inactive Enable MFA on root user

2. kuettai

CheckCurrent ValueRecommendation
userNotUsingGroup - Place IAM user within User Group
InlinePolicy EpoxyMitigationsDenyAll
ss-test-inline
Use managed policies

3. AccessAnalyzerTrustedService

CheckCurrent ValueRecommendation
unusedRole 1371 days passed Review & remove inactive roles
InlinePolicy AccessAnalyzerTrustedServicePolicy Use managed policies

4. AVMContainersUserRole

CheckCurrent ValueRecommendation
unusedRole 827 days passed Review & remove inactive roles
InlinePolicy AWSContainerAssessmentPolicy Use managed policies

5. aws-ec2-spot-fleet-tagging-role

CheckCurrent ValueRecommendation
unusedRole 1663 days passed Review & remove inactive roles

6. awslogs.prod.kelex.molecule.toppatterns

CheckCurrent ValueRecommendation
unusedRole 432 days passed Review & remove inactive roles
InlinePolicy AWSLogsOptimizerPolicy Use managed policies

7. AWSReservedSSO_AWSAdministratorAccess_fae89f7963febc98

CheckCurrent ValueRecommendation
roleLongSession 43200 Review & reduce max session duration
FullAdminAccess AdministratorAccess Limit permissions.

8. AWSVAPTAudit

CheckCurrent ValueRecommendation
unusedRole 1446 days passed Review & remove inactive roles

9. CloudSecAuditRole

CheckCurrent ValueRecommendation
unusedRole 362 days passed Review & remove inactive roles
InlinePolicy CloudSecAuditPolicy-prod Use managed policies

10. CloudSeerTrustedServiceRole

CheckCurrent ValueRecommendation
unusedRole 408 days Review & remove inactive roles
InlinePolicy CloudSeerTrustedServicePolicy Use managed policies

11. CodeDeployRole

CheckCurrent ValueRecommendation
unusedRole 1663 days passed Review & remove inactive roles

12. CodeGuruProfilerForwardToAmazonProfiler

CheckCurrent ValueRecommendation
unusedRole 593 days passed Review & remove inactive roles
InlinePolicy CodeGuruProfilerPolicy Use managed policies

13. CodeStarWorker-dojo-CloudFormation

CheckCurrent ValueRecommendation
unusedRole 1645 days passed Review & remove inactive roles
InlinePolicy CodeStarWorkerCloudFormationRolePolicy Use managed policies

14. CodeStarWorker-dojo-ToolChain

CheckCurrent ValueRecommendation
unusedRole 1645 days passed Review & remove inactive roles
ManagedPolicyFullAccessOneServ AWSCodeStarFullAccess
AWSCodeBuildAdminAccess
AWSCodeCommitFullAccess
AWSLambdaFullAccess
AWSCodeDeployFullAccess
AWSElasticBeanstalkFullAccess
CloudWatchEventsFullAccess
AWSCodePipeline_FullAccess
Limit permissions.
InlinePolicy ToolChainWorkerPolicy Use managed policies

15. CodeStarWorker-dojo-WebApp

CheckCurrent ValueRecommendation
unusedRole 1645 days passed Review & remove inactive roles
InlinePolicy CodeStarWorkerBackendPolicy Use managed policies

16. Cognito_dojoIdPAuth_Role

CheckCurrent ValueRecommendation
unusedRole 1676 days passed Review & remove inactive roles
InlinePolicy oneClick_Cognito_dojoIdPAuth_Role_1606463253534 Use managed policies
InlinePolicyFullAccessOneServ oneClick_Cognito_dojoIdPAuth_Role_1606463253534 Limit access in policy

17. Cognito_dojoIdPUnauth_Role

CheckCurrent ValueRecommendation
unusedRole 1676 days passed Review & remove inactive roles
InlinePolicy oneClick_Cognito_dojoIdPUnauth_Role_1606463253534 Use managed policies
InlinePolicyFullAccessOneServ oneClick_Cognito_dojoIdPUnauth_Role_1606463253534 Limit access in policy

18. DocumentUnderstandingSolutionCICD-CICDHelperRole-ERDSGV99V9GT

CheckCurrent ValueRecommendation
unusedRole 1629 days passed Review & remove inactive roles

19. DocumentUnderstandingSolutionCICD-CodeBuildRole-26NRX1QIOV08

CheckCurrent ValueRecommendation
unusedRole 1629 days passed Review & remove inactive roles
InlinePolicy document-understanding-reference-architecture-codebuild Use managed policies

20. DocumentUnderstandingSolutionCICD-CodePipelineRole-12BUYRAKNJIEQ

CheckCurrent ValueRecommendation
unusedRole 1629 days passed Review & remove inactive roles

21. DojoEC2AdminRole

CheckCurrent ValueRecommendation
unusedRole 1669 days passed Review & remove inactive roles
FullAdminAccess AdministratorAccess Limit permissions.

22. EC2AdminRole

CheckCurrent ValueRecommendation
unusedRole 1740 days passed Review & remove inactive roles
FullAdminAccess AdministratorAccess Limit permissions.
InlinePolicy QuickSightGetDashboardURL Use managed policies

23. EC2CapacityReservationService

CheckCurrent ValueRecommendation
unusedRole 1740 days passed Review & remove inactive roles

24. IMDSv2-automigrator

CheckCurrent ValueRecommendation
unusedRole 235 days Review & remove inactive roles
InlinePolicy IMDSv2-automigrator Use managed policies

25. itadmin

CheckCurrent ValueRecommendation
roleLongSession 43200 Review & reduce max session duration
unusedRole 294 days Review & remove inactive roles
FullAdminAccess AdministratorAccess Limit permissions.

26. OrganizationAccountAccessRole

CheckCurrent ValueRecommendation
FullAdminAccess AdministratorAccess Limit permissions.

27. OrthancRole

CheckCurrent ValueRecommendation
ManagedPolicyFullAccessOneServ AmazonGuardDutyFullAccess Limit permissions.
InlinePolicy AmazonGuardDutyFullAccess Use managed policies

28. PACICloudFormationStackSetAdministrationRole

CheckCurrent ValueRecommendation
unusedRole 294 days Review & remove inactive roles
InlinePolicy AssumeRole-PACICloudFormationStackSetExecutionRole Use managed policies

29. PACICloudFormationStackSetExecutionRole

CheckCurrent ValueRecommendation
unusedRole 294 days Review & remove inactive roles
FullAdminAccess AdministratorAccess Limit permissions.

30. SaltyTrustedService

CheckCurrent ValueRecommendation
unusedRole 274 days passed Review & remove inactive roles
InlinePolicy SaltyTrustedServicePolicy Use managed policies

31. ServiceScreenerAssumeRole

CheckCurrent ValueRecommendation
roleLongSession 14400 Review & reduce max session duration
unusedRole 581 days Review & remove inactive roles
InlinePolicy CloudFormationCreateStack Use managed policies

32. ServiceScreenerAutomationRole

CheckCurrent ValueRecommendation
unusedRole 145 days Review & remove inactive roles
FullAdminAccess AdministratorAccess Limit permissions.

33. ShadowTrooperRole

CheckCurrent ValueRecommendation
unusedRole 425 days passed Review & remove inactive roles
InlinePolicy ShadowTrooperPolicy-prod Use managed policies

34. stacksets-exec-7ca18804340a75b25a831ca17fba8659

CheckCurrent ValueRecommendation
unusedRole 579 days Review & remove inactive roles
FullAdminAccess AdministratorAccess Limit permissions.

35. TurtleRoleManagement

CheckCurrent ValueRecommendation
unusedRole 531 days passed Review & remove inactive roles
InlinePolicy TurtleRoleManagementPolicy Use managed policies

36. Config

CheckCurrent ValueRecommendation
enableCURReport Setup Cost and Usage Report
PartialEnableConfigService us-east-1 Enable AWS Config
hasAlternateContact No alternate contacts Configure AWS account contacts
enableCostBudget Monitor your AWS spending
passwordPolicy NoSuchEntity Set a custom password policy.
supportPlanLowTier Subscribe to the AWS Business Support tier (or higher)