View IAM Violations
IAM violations show you IAM security principles that your account does not comply with. For this to be possible, you must first set up your AWS account(s) on nOps. These violations could range from accounts not using MFA, accounts not granted least privilege To view IAM role violations take the following steps
Go to the nOps Rules tab.
nOps Rules page will be launched with various tabs showing the different options. Such as Security, Cost, Reliability, Operations, Performance, and Change Management
On the left sidebar, there is a section called Filters. Under Filters, there is a search bar. In that search bar type the word IAM. and press the enter key to search.
This will show a list of IAM violations on the right-hand side. From the screenshot we can see at least 4 sections of violations; 266 AWS IAM roles aren't attached to any resource, 36 users have not been granted least privilege permissions in AWS IAM, 11 active root account access key(s) detected, 6 AWS IAM users aren't using MFA-enabled sign in.