1/ 🚀🚀🚀IAM actions last accessed by users or roles your AWS account: in addition to S3 mgmt actions, you now can see when Amazon EC2, AWS IAM, and AWS Lambda actions were last used! Here I can see that I just attempted a DeleteRole & DeletePolicy in the #AWSIAM service:
2/ In addition to viewing actions last accessed in the console, you can also view them programmatically for the services that support it, see (boto3 docs): boto3.amazonaws.com/v1/documentati…
3/ For some IAM console and AWS CLI examples, read more about this on the AWS Security Blog: aws.amazon.com/blogs/security…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
⏱️Starting now! ⏱️ @AWSIdentity – presenting our session SEC316 with Brigid @bjohnso5y on Access Control Confidence. 💪⚡ I will be live tweeting the highlights!
@AWSIdentity@bjohnso5y Access control is a journey towards least privilege. Brigid is going to share with us how to make it a confident one.
@AWSIdentity@bjohnso5y Access control confidence. Brigid breaks it down into three parts – permission guardrails, attribute-based access control, and reining in permissions using analytics.