详细分析 ▾
运行时依赖
版本
- Initial release of watadot-aws-iam. - Provides IAM security patterns for managing AWS users, roles, and policy verification. - Includes audit commands for users and access keys, role orchestration, and policy inspection. - Documents security best practices, including MFA enforcement and use of Access Analyzer.
安装命令 点击复制
技能文档
Security-first identity and access management patterns.
🚀 Core Commands
Identity Audit
# List all users with ARN and creation date
aws iam list-users --query "Users[].{User:UserName,Arn:Arn,Date:CreateDate}" --output table# Find unused access keys (90+ days)
aws iam list-users --query "Users[].UserName" --output text | xargs -I {} aws iam list-access-keys --user-name {} --query "AccessKeyMetadata[?Status==\Active\ && CreateDate < \2025-12-31\]"
Role Orchestration
# Assume a role and get temporary credentials
aws sts assume-role --role-arn --role-session-name "OpenClawSession"# List policies attached to a specific role
aws iam list-attached-role-policies --role-name --query "AttachedPolicies[].PolicyName"
Policy Verification
# Get effective policy document
aws iam get-policy-version --policy-arn --version-id --query "PolicyVersion.Document"
🧠 Best Practices
- Never use Root: Use IAM users or SSO roles for daily operations.
- Short-lived Credentials: Prefer
sts assume-roleover permanent access keys. - MFA Enforcement: Enable Multi-Factor Authentication for all console and sensitive CLI access.
- Access Analyzer: Regularly run IAM Access Analyzer to find unintended public or cross-account access.
免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制