Habilidades aws-iam-best-practices
📦

aws-iam-best-practices

Seguro

Review and Harden IAM Policies

This skill helps Claude and Codex users implement AWS IAM best practices by reviewing policies, identifying overly permissive access, and generating least-privilege IAM configurations.

Soporta: Claude Codex Code(CC)
🥉 73 Bronce
1

Descargar el ZIP de la skill

2

Subir en Claude

Ve a Configuración → Capacidades → Skills → Subir skill

3

Activa y empieza a usar

Pruébalo

Usando "aws-iam-best-practices". Review my IAM policies for security issues

Resultado esperado:

  • Security Review Summary:
  • • Found 3 policies with wildcard (*) actions
  • • 5 users without MFA enabled
  • • 2 access keys older than 90 days
  • • Recommendations provided for each finding

Usando "aws-iam-best-practices". Create a least privilege policy for S3 access

Resultado esperado:

  • IAM Policy Generated:
  • • Allows s3:GetObject and s3:PutObject to specific bucket prefix
  • • Uses ${aws:username} for user-specific access
  • • Includes ListBucket condition for prefix restriction

Auditoría de seguridad

Seguro
v1 • 2/24/2026

All 48 static findings are false positives. The skill contains legitimate AWS CLI commands for IAM security auditing, AWS documentation URLs, RFC5737 documentation IP addresses, and standard IAM policy syntax. This is a defensive security skill focused on IAM hardening and least privilege implementation with no malicious functionality.

1
Archivos escaneados
398
Líneas analizadas
0
hallazgos
1
Auditorías totales
No se encontraron problemas de seguridad

Patrones detectados

AWS CLI Commands for IAM Auditing (False Positive)Hardcoded AWS Documentation URLs (False Positive)RFC5737 Documentation IP Addresses (False Positive)Temp Directory for MFA QR Code (False Positive)
Auditado por: claude

Puntuación de calidad

38
Arquitectura
100
Mantenibilidad
87
Contenido
50
Comunidad
100
Seguridad
83
Cumplimiento de la especificación

Lo que puedes crear

Security Engineer Auditing IAM

Security engineer reviews AWS account IAM configurations quarterly, identifying overly permissive policies and users without MFA for remediation

Developer Creating S3 Access Policy

Developer creates a least-privilege S3 access policy that grants only required permissions to specific bucket prefixes

DevOps Implementing MFA Enforcement

DevOps team implements MFA-required policies to enforce multi-factor authentication for sensitive AWS operations

Prueba estos prompts

Basic IAM Policy Review
Review my IAM policies for common security issues like overly permissive actions, wildcard resources, or missing conditions.
Find Users Without MFA
Find all IAM users in my account that do not have MFA enabled and generate a list for remediation.
Create Least Privilege S3 Policy
Create an IAM policy that allows read and write access to a specific S3 bucket prefix for a single user, using conditions for security.
Generate MFA Enforcement Policy
Generate an IAM policy that denies all actions unless the requester has authenticated with MFA.

Mejores prácticas

  • Use AWS managed policies instead of inline policies for better auditability and reusability
  • Implement least privilege by granting only the specific actions needed for each use case
  • Enable MFA for all users, especially those with administrative access

Evitar

  • Using wildcard (*) in Action or Resource elements - always specify exact permissions
  • Granting administrative access as a default - use role-based access control instead
  • Skipping regular access reviews - schedule quarterly IAM policy audits

Preguntas frecuentes

Does this skill execute AWS API calls?
No, this skill provides guidance, templates, and example commands. It does not directly modify AWS IAM configurations.
Can this skill create IAM policies for me?
Yes, it can generate IAM policy JSON templates based on your requirements for least privilege access.
What AWS CLI commands does this skill reference?
It provides examples using standard AWS CLI commands like list-policies, get-policy, list-users, and simulate-principal-policy for IAM auditing.
Is this skill safe to use in production environments?
Yes, this is a defensive security skill focused on hardening IAM. It provides read-only analysis and template generation.
Does this skill work with AWS Organizations?
The skill focuses on account-level IAM but can analyze policies across accounts when run with appropriate cross-account access.
What Python libraries are needed for automation?
The included Python script requires boto3 and standard library modules. Configure AWS credentials before running.

Detalles del desarrollador

Estructura de archivos

📄 SKILL.md