AWS IAM Security Scan

Scan & monitor for AWS IAM security issues

AWS Identity and Access Management (IAM) on Vectrix

Scan AWS IAM for security issues on Vectrix
Setup time
Less than 5 minutes
About this security scan
The AWS IAM security scan on Vectrix detects a variety of IAM security issues in a connected AWS account that could be leaving you vulnerable or non-compliant. This includes IAM user and role misconfigurations, SOC 2 and/or ISO 27001 compliance violations, and other issues.
Scan on-demand to detect active IAM security issues that you have.
Monitor continuously to get alerted about new IAM security issues in the future.
Don't know how AWS IAM works? Read more below.
What this scan detects
  • Users with Multi-Factor Authentication (MFA) disabled

    Users with Multi-Factor Authentication (MFA) disabled could be problematic as it not only presents the risk of violating compliance requirements, but lowers the difficulty for an attacker to gain unauthorized access to a user's AWS account.
  • Creation and deletion of AWS access keys

    Creation and deletion of access keys could be problematic as it is a potential warning sign of unauthorized access and activity in your AWS account. Use Monitoring to receive this finding.
  • IAM roles with cross-account access

    IAM roles with cross-account access can be problematic as granting privileges to external AWS accounts present an elevated security risk of unauthorized access and/or activity occurring, potential from outside parties.
  • Old and unused access keys and passwords

    Old and unused access keys and passwords could be problematic as they not only present potential compliance violations (password and key rotations), but they can also increase the risk of an old and/or unused credential being used elsewhere for unauthorized purposes.
  • Insecure password policies

    Weak password policies could be problematic as they not only present potential compliance violations (minimum password strength requirements), but they can also allow for users to create and use unsafe passwords with minimal strength and complexity.
  • Root user activity

    Detecting IAM root user activity can be problematic as it not only goes against official AWS best practices, but is also a potential warning sign of elevated unauthorized access in your AWS account. Use Monitoring to receive this finding.
Sign in or create an account to see the full list of findings.

Ready to scan AWS IAM?

Start detecting security issues in AWS IAM - no credit card required.
Discover why IT and Security teams rely on Vectrix to keep their SaaS tools secure.
Vectrix helps us identify shared files, insecure settings, user access issues, and more. It's quickly becoming the gold standard in the SaaS security space.
Alex Dunbrack, Co-founder of Vectrix
Alex Dunbrack
Co-founder and COO,
Vectrix.io