Edit me

View IAM Violations

View IAM security principles that show any violations

How to view IAM violations

==========================

IAM violations show you IAM security principles that your account does not comply with. For this to be possible, you must first set up your AWS account(s) on nOps. These violations could range from accounts not using MFA, accounts not granted least privilege To view IAM role violations take the following steps

Go to the nOps Rules tab.

nOps Rules page will be launched with various tabs showing the different options. Such as Security, Cost, Reliability, Operations, Performance, and Change Management

On the left side-bar, there is a section called Filters. Under Filters, there is a search bar. In that search bar type the word IAM. and press the enter key to search

This will show a list of IAM violations on the right-hand side. From the screenshot we can see at least 4 sections of violations; 266 AWS IAM roles aren’t attached to any resource, 36 users have not been granted least privilege permissions in AWS IAM, 11 active root account access key(s) detected, 6 AWS IAM users aren’t using MFA-enabled sign in



AWS Migration Assistance Program Tracker
Backfilling a CUR file
Tag Explorer to Manage Tag Competency
The nOps Data Explorer
Creating nOps Custom Rules
View Underutilized EBS Volumes
View Under-Utilized Network Resources
Adding users to nOps
Change Password
Customize Settings
Data Purge
Disable Notifications
Notifications Center
Recover Your Password
Configure Weekly Reports
Back to top       Home