โ† Back to Overview

#2 AWS IAM Security Review: Manual Access Audit & Temporary Role Implementation

Overview

This lab demonstrates a hands-on AWS IAM security review focused on identifying and mitigating over-privileged access, enforcing least privilege, and implementing temporary, auditable administrative access using IAM roles and STS โ€” all within a Free Tier, single-account environment.

Environment

Objective

Users in Scope

Key Steps

  1. IAM Users & Groups Review
    Identified standing admin access on ops_user and admin_user.
  2. Access Analyzer Scan
    No external access findings; confirmed no unintended permissions.
  3. Temporary Admin Role Creation
    AdminRole with AdministratorAccess, trust limited to ops_user, MFA required.
  4. Removal of Standing Admin Access
    Detached AdministratorAccess from ops_user (user & group level).
  5. Validation
    Assumed AdminRole via Switch Role, tested S3/EC2 actions, confirmed no standing access remains.
  6. Logging & Audit
    CloudTrail enabled; verified AssumeRole events and temporary credentials.

Lessons Learned

"This lab mirrors real-world IAM evolution: from standing user permissions โ†’ temporary, auditable role-based access."

Outcome

Standing admin access removed โ€ข Temporary role-based access implemented โ€ข All actions auditable via CloudTrail โ€ข Least privilege enforced โ€ข Risks mitigated.

Next Steps

Screenshots from the Lab