An Automated Approach to Identifying and Mitigating Least Privilege Violations in AWS IAM Policies

  • Unique Paper ID: 164686
  • Volume: 10
  • Issue: 12
  • PageNo: 2353-2359
  • Abstract:
  • The research presents an automated tool to identify violations of the principle of least privilege in AWS Identity and Access Management (IAM) policies. The tool scans all IAM policies within an AWS account or a single policy file, analyzing policy documents to identify potentially risky permissions. It uses the Boto3 library and Python programming language to retrieve policy information and assess permissions. The analysis results are presented in an HTML report, providing an intuitive triage worksheet for security professionals. This tool contributes to automating security practices in cloud environments, enhancing efficiency and decision-making.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{164686,
        author = {Janhvi Pankaj Kamble and Suraksha Khurana  and Purvi Bajaj},
        title = {An Automated Approach to Identifying and Mitigating Least Privilege Violations in AWS IAM Policies},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {10},
        number = {12},
        pages = {2353-2359},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=164686},
        abstract = {The research presents an automated tool to identify violations of the principle of least privilege in AWS Identity and Access Management (IAM) policies. The tool scans all IAM policies within an AWS account or a single policy file, analyzing policy documents to identify potentially risky permissions. It uses the Boto3 library and Python programming language to retrieve policy information and assess permissions. The analysis results are presented in an HTML report, providing an intuitive triage worksheet for security professionals. This tool contributes to automating security practices in cloud environments, enhancing efficiency and decision-making.},
        keywords = {Cloud Security Posture Management System (CSPM), Amazon Web Service(AWS), Identity Access and Management (IAM) Policy, Identity Service Providers (IdSP), IAM as a Service (IAMaaS), Google Cloud Platform Services(GCP), Application programming interface(API), Role-Based Access Control(RBAC)},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 10
  • Issue: 12
  • PageNo: 2353-2359

An Automated Approach to Identifying and Mitigating Least Privilege Violations in AWS IAM Policies

Related Articles