August 25th, 2024

An AWS IAM Security Tooling Reference

The article reviews AWS Identity and Access Management security tools, emphasizing their complexity and importance, while highlighting various tools like Zelkova, PMapper, and Cloudsplaining for enhancing IAM security.

Read original articleLink Icon
An AWS IAM Security Tooling Reference

The article revisits the landscape of AWS Identity and Access Management (IAM) security tools, highlighting their importance and complexity. It discusses various tools designed to enhance IAM security, including AWS's own Zelkova and IAM Access Analyzer, which help identify shared resources and analyze permissions. PMapper, developed by NCC Group, answers critical IAM security questions and has added features for resource policies and external access. Cloudsplaining, from Salesforce, focuses on identifying least privilege violations and offers comprehensive reporting on various security issues. Other notable tools include Apeman, which models IAM permissions, and Parliament, an IAM linting library that detects subtle issues that could lead to privilege escalation. The article also mentions newer tools like aws-lint-iam-policies and IAMSpy, which provide additional validation and analysis capabilities. It concludes by noting some unmaintained or deprecated tools that are no longer recommended. Overall, the article serves as a reference for current IAM security tooling options available for AWS environments.

- AWS IAM is complex and critical for security.

- Various tools exist to enhance IAM security, including AWS's Zelkova and IAM Access Analyzer.

- PMapper and Cloudsplaining are notable tools for analyzing IAM permissions and identifying security violations.

- Newer tools like Apeman and IAMSpy offer advanced modeling and validation capabilities.

- Some older tools are unmaintained and not recommended for use.

Link Icon 5 comments
By @InfoSecErik - 7 months
PMapper author here: I can't give PMapper the love it deserves, but I fully support the work done in Fennerr's fork at https://github.com/Fennerr/PMapper .
By @okr - 7 months
Kinda related: Is there a good tool for managing all these resources and credentials at AWS in an enterprise environment? We started nicely from top to down, splitting the root account into sub accounts and then having a terraform project per sub account. But now these terraform projects split themselves and start sharing their tfstate and i even saw circular references, as they try to share the variables to resources arns and so on. And policies are growing like crazy. It seems more like a mesh now.

Or is this the new normal?

By @captn3m0 - 7 months
I’ve been pondering on the question of why AWS Inventory CSPM tooling doesn’t back-propagate relationships via IAM, and this post is helpful with some prior art on the other attempts in the space to solve for it.
By @randomname93857 - 7 months
Is there anything like this list but for Azure?