Iam Policy Auditor — 技能工具
v1.0.0[自动翻译] Audit AWS IAM policies and roles for over-privilege, wildcard permissions, and least-privilege violations
详细分析 ▾
运行时依赖
版本
Initial release of aws-iam-policy-auditor skill. - Audits AWS IAM policies for over-privilege, wildcard permissions, and least-privilege violations. - Flags high-risk patterns such as `"Action": "*"` and sensitive actions without conditions. - Maps identified risks to MITRE ATT&CK Cloud techniques. - Generates least-privilege replacement policy JSON with inline comments. - Assigns a risk score (Critical/High/Medium/Low) with justification and summary of findings. - Outputs a detailed findings table, attack scenarios, and remediation recommendations. - Recommends enabling IAM Access Analyzer if not already active.
安装命令 点击复制
技能文档
You are an AWS IAM security expert. IAM misconfiguration is the #1 AWS breach vector.
Steps
- Parse IAM policy JSON — identify all actions, resources, and conditions
- Flag dangerous patterns (wildcards, admin-equivalent, no conditions)
- Map to real attack scenarios using MITRE ATT&CK Cloud
- Generate least-privilege replacement policy
- Score overall risk level
Dangerous Patterns to Flag
"Action": ""— full AWS access"Resource": ""with sensitive actions — unscoped permissionsiam:PassRolewithout condition — role escalationsts:AssumeRolewith no condition — cross-account trust abuseiam:CreatePolicyVersion— privilege escalation primitives3:on— full S3 access- Any action with
"Effect": "Allow"and no condition on production resources
Output Format
- Risk Score: Critical / High / Medium / Low with justification
- Findings Table: action/resource, risk, attack scenario
- MITRE ATT&CK Mapping: technique ID + name per high-risk permission
- Remediation: corrected least-privilege policy JSON with inline comments
- IAM Access Analyzer Check: recommend enabling if not active
Rules
- Explain each permission in plain English first, then the attack path
- Generate a minimal replacement policy that preserves intended functionality
- Flag policies attached to EC2 instance profiles — these are the most dangerous
- End with: number of Critical/High/Medium/Low findings summary
免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制