<aside> 💢
AWS Grant permissions to IAM Users based on their job functions,(AdministratorAccess for Administrators and PowerUserAccess for Developer Power Users.)
</aside>
aws:username - for a specific user or org (org id)
aws:sourceip - restrict to a specific IP
aws:Requested region - to limit to s specific region
aws:ResourceTag:ec2 - limit to a specific resource tag
aws:MultiFactor - enforce MFA
for S3: for a specific ARN (bucket) or specific object *
<aside> ✍🏻 Access advisor - to see permissions granted and when last used
</aside>
<aside> 🗣️ Access analyzer - review resources that are shared with external entity's. (S3,IAM,KMS,Lambda,SQS) can validate policy for best practices, and get recommendations & policy generation based on activity
</aside>
We can use both to provide cross account access to resources - but :
when you assume a role - you give up your original permissions and are limited only to the role