Skip to main content

🧩 09. IAM Access Analyzer

IAM Access Analyzer is a security feature that helps you identify AWS resources shared outside your account or organization — ensuring that only trusted entities have access to your data.


🧠 What It Does

FeatureDescription
Resource Sharing DetectionAnalyzes resource policies to find resources accessible from outside your defined Zone of Trust.
Supported ResourcesWorks with S3 Buckets, IAM Roles, KMS Keys, Lambda Functions & Layers, SQS Queues, and Secrets Manager Secrets.
Findings GenerationGenerates findings whenever a resource is accessible to external accounts, public users, or other AWS organizations.
Continuous MonitoringAutomatically scans and updates findings as configurations change.
Policy ValidationHelps you validate IAM and resource policies against best practices to reduce overly permissive access.

🧭 Zone of Trust

TermDescription
Zone of TrustThe trusted boundary you define — typically your AWS Account or AWS Organization.
Outside Zone of TrustAny principal (user, role, service, or account) outside this boundary triggers an Access Analyzer finding.
IAM Roles Example

🧩 Example Findings

ExampleDescription
🔓 S3 bucket allows public accessThe bucket policy permits access from Principal: *
🔄 IAM role shared with another AWS accountRole trust policy allows external principal
🔑 KMS key shared externallyKey policy allows use by another AWS account

⚙️ Integration & Actions

  • View and manage findings in the IAM Console or via the AWS CLI/API.
  • Integrates with AWS Security Hub for centralized monitoring.
  • Supports automated remediation using EventBridge and Lambda.

In short:
🧩 IAM Access Analyzer continuously scans your AWS environment to detect and alert you when resources are shared outside your trusted boundaries — helping you maintain least-privilege access and stronger security control.