aws-iam

Manage identity and access in AWS.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "aws-iam" with this command: npx skills add bagelhole/devops-security-agent-skills/bagelhole-devops-security-agent-skills-aws-iam

AWS IAM

Manage identity and access in AWS.

IAM Policies

{ "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Action": [ "s3:GetObject", "s3:PutObject" ], "Resource": "arn:aws:s3:::my-bucket/*" }] }

Create Role

Create role with trust policy

aws iam create-role
--role-name EC2AppRole
--assume-role-policy-document '{ "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Principal": {"Service": "ec2.amazonaws.com"}, "Action": "sts:AssumeRole" }] }'

Attach policy

aws iam attach-role-policy
--role-name EC2AppRole
--policy-arn arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess

Service-Linked Roles

For services like ECS, RDS

aws iam create-service-linked-role
--aws-service-name ecs.amazonaws.com

Best Practices

security_practices:

  • Use roles, not long-term credentials
  • Implement least privilege
  • Enable MFA
  • Regular access reviews
  • Use IAM Access Analyzer
  • Implement SCPs for organizations

Policy Conditions

{ "Condition": { "StringEquals": { "aws:RequestedRegion": "us-east-1" }, "Bool": { "aws:MultiFactorAuthPresent": "true" } } }

Best Practices

  • Follow least privilege

  • Use IAM roles for applications

  • Enable CloudTrail for auditing

  • Regular credential rotation

  • Use permission boundaries

Related Skills

  • terraform-aws - IaC deployment

  • access-review - Access auditing

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

sops-encryption

No summary provided by upstream source.

Repository SourceNeeds Review
Security

linux-administration

No summary provided by upstream source.

Repository SourceNeeds Review
Security

linux-hardening

No summary provided by upstream source.

Repository SourceNeeds Review