iamlive
parliament
iamlive | parliament | |
---|---|---|
30 | 7 | |
2,952 | 986 | |
- | 0.6% | |
6.2 | 1.5 | |
2 months ago | 18 days ago | |
Go | Python | |
MIT License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
iamlive
-
Why has AWS made IAM Actions impossible to find?
Also things like this (same guy) if you have a sandbox to play in with wider permissions and are trying to build a more scoped profile: https://github.com/iann0036/iamlive
- iann0036/iamlive: Generate an IAM policy from AWS calls using client-side monitoring (CSM) or embedded proxy
-
Why Companies Still Struggle with Least Privilege in the Cloud?
I know there is a tool called iamlive that logs all API calls on your local machine. So you can run commands as an admin user locally while this is running, and find out what permissions were needed. Then you tear down the infra you just deployed, and add those same permissions to a service user of some kind (e.g. a CICD role) to avoid over-privileging it. It's messy but it can be helpful.
-
AWS Creates New Policy-Based Access Control Language Cedar
actually Ian (aws hero) has a tool that does exactly this
https://github.com/iann0036/iamlive
- Permissions Map
- iamlive
-
Show HN: Slauth.io (YC S22) – IAM Policy Auto-Generation
I have used https://github.com/iann0036/iamlive with great success in the past. On high level, the approach you are describing is iamlive on steroids and UX improved.
Kudos on launch, will check your beta
- IAM Live
-
Pike: Tool to determine your IAM requirements from code
Thanks! Permissions are determined per resource or datasource. There's no easy way that I had found, especially if you want this done statically, https://github.com/iann0036/iamlive does it by inspecting your api calls but there's always a look up somewhere. Hopefully ill manage to get a few community contributions and get the ball rolling, i've made it as easy as I could to add support for other resources without you even really having to know golang.
-
The End of CI
IAM isn’t fun, but there’s lots of options.
https://pypi.org/project/access-undenied-aws/ will allow you to start with least privilege and fix specific issues.
https://github.com/iann0036/iamlive allows an admin to perform the action via CLI and capture the policy.
Access advisor can inspect how you actually use the role and give suggestions on what to remove.
A more helpful suggestion is to experiment with these tools and then find gaps in IAM actions and submit those as feature requests via your TAM.
parliament
-
AWS Creates New Policy-Based Access Control Language Cedar
All of the sdks support client side monitoring (CSM), so these sort of tools can be built client side. https://boto3.amazonaws.com/v1/documentation/api/1.10.46/gui...
afaics the only challenge is mapping some of the apis to iam as its only 85% 1:1
There's also tools for helping with iam like (generator, and linter)
https://github.com/salesforce/policy_sentry
https://github.com/duo-labs/parliament
- parliament
- Is there a way to test policies without the AWS policy simulator? maybe an API or library?
-
IAM Role & Policy request - Automated review
There are IAM linting libraries like parliament (https://github.com/duo-labs/parliament) that can be used to build a solution like the one you described. There are also some other open source tools that use it for security purposes. You'd probably have to customize them for use in your own CICD processes.
-
Actions, resources, and condition keys for AWS services - is there an API for this document?
No API, but you can generate JSON output using https://github.com/duo-labs/parliament (or a modified version that includes undocumented actions at https://github.com/iann0036/iam-dataset/blob/main/iam\_definition.json).
-
I built a Power Editor that makes IAM creation simpler
Sift through 9000+ privileges in just a few key presses, ARN's are instantly recommended and their input/validation is streamlined. Additional statements can be added via hotkey, and your policy will be checked in real-time for syntax errors or other bugs (thanks Parliament!).
-
Is there a tool that tells you which IAM actions to allow if you give it an API operation?
I've been literally tweeting at aws for a long time now for a tool like this lol, haven't found anything. but you can play around with Parliament
What are some alternatives?
aws-leastprivilege - Generates an IAM policy for the CloudFormation service role that adheres to least privilege.
trailscraper - A command-line tool to get valuable information out of AWS CloudTrail
consoleme - A Central Control Plane for AWS Permissions and Access
iamzero - Identity & Access Management simplified and secure.
policy_sentry - IAM Least Privilege Policy Generator
cloudtracker - CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.
iamlive-lambda-extension - Lambda Extension for iamlive
spicedb - Open Source, Google Zanzibar-inspired permissions database to enable fine-grained access control for customer applications
cel-spec - Common Expression Language -- specification and binary representation