AWS Account Dashboard and Risks Defined in PAM36010 minutes to read
The AWS Account dashboard within the PAM360 Cloud Entitlements tab offers a comprehensive view of your IAM users, roles, and users groups in the AWS account, including the security posture and risk status they poses in the cloud environment. After discovering an AWS account, access the dashboard to gain key insights into identity privileges, attached policies, services, and permissions. Additionally, the dashboard provides detailed statistical reports on overall risk impact, identity-specific impacts, and weekly risk assessments, and the number of identities with excessive privileges, shadow admin privileges, inactive for a longer period, and without MFA. To explore the account dashboard features and get insights about the PAM360-defined risks, refer to the sections below. 1. AWS Account Dashboard FeaturesThe intuitive Cloud Entitlement dashboard provides the following details in your AWS account,
2. Risks Defined in PAM360 for Cloud Entitlements
Once you open your AWS account, you can view the Risks tab from the left-side pane. You can get the following information within the Risks tab:
3. Summary of Available Users, User Groups, and RolesTo view the list of IAM users, roles, and user groups of the discovered AWS account in PAM360, open the account tile and explore the Users, User Groups, or Roles tabs on the left-side pane. Upon clicking an identity from the Users, User Groups, or Roles page, you will get the following details associated with the identity: Access Map, Policy Details, Risk & Remediation, and History. 3.1 Access MapThe Access Map in PAM360 is a built-in feature designed to provide clear insights into areas with excessive permissions and standing privileges, supporting a streamlined approach to least-privilege access management. The Access Map tree offers a comprehensive view of policies, permissions, and services associated with each identity - whether user, user group, or role - within an AWS environment. To examine the permissions mapped to an identity via associated policies, simply select the desired service from the Access Map tree. This action reveals both used and unused permissions, enabling precise control and better governance over privilege assignments. 3.2 Policy DetailsThis section provides information about the currently attached policies and the associated IAM users or user groups of the identity.
3.3 Risks & RemediationThis section shows the list of risks associated with the identity. The Shadow Admin Privileges and Excessive Privileges risks can be remediated directly from this section using the provided Remediate button. For other risks, expand the risk ribbon to view the remediation steps. Refer to this document to learn more about remediating PAM360-defined risks in your cloud environment. 3.4 HistoryThe information about the remediated and reverted risks of the identity are listed in the History tab. Additionally, you can get full insights about the remediated risk from this section. If you want to revert any remediation, click the Revert button on the risk ribbon and confirm your action. However, ensure to read the permissions that will be restored to the identity while reverting the risk. By consolidating these details, you can effectively manage the users, user groups, and roles within your AWS account, addressing any associated risks and ensuring proper policy and access management. Important Note: Identities from a discovered AWS account in PAM360 that have been deleted or disabled in the AWS console can no longer be managed in PAM360’s Cloud Entitlements. These unmanaged identities will still appear on the Users, User Groups, and Roles pages after the daily CloudTrail event retrieval or on-demand data retrieval. To remove these disabled or deleted identities from PAM360, click the Delete icon beside each identity and confirm your action in the pop-up dialog box. | ||||||||||||||||