Skip to content

aws-samples/iam-access-key-report

IAM Access Key Report

This is a simple tool written in python that will enumerate data about all active IAM access keys across an AWS Organization and will enrich each key with account tag information.

The output of the tool is a CSV file that can then be filtered based on the tag information associated with the keys.

This allow us to focus on access keys that are used in things like 'Environment:Production' accounts or in accounts that are labelled with 'DataClassification:Restricted'.

In addition, the tool performs some basic security checks of the IAM policies of the user accounts the access keys are attached to. It will tell you if a key has administrative permissions or is able to read your data in Amazon S3, Amazon RDS, and Amazon DynamoDB.

Solution architecture and design

The tool has been designed to retrieve account tags from an AWS Organization and expects to have those permissions through local credentials or being passed a profile. For each account it finds, the tool then tries to assume a role into it to extract an IAM Credential report and analyse IAM policies.

It can be run in one of three ways.

1. End-to-end

This uses local credentials or a profile that can get account information from AWS Organizations AND can assume a role into each member account. This is the default behaviour.

$ python3 ./iam-access-key-report.py -o output-file.csv [-p PROFILE]

2. Using separate credentials for AWS Organizations access and assuming roles

This breaks up the process into two steps:

  1. Use one set of credentials or profile to get account tags and output this to a file
$ python3 ./iam-access-key-report.py -s my-tags.json -p PROFILE_TO_ACCESS_ORGANIZATIONS
  1. Use a separate set of credentials or profile to access each member account while providing the account tags in a file
$ python3 ./iam-access-key-report.py -l my-tags.json -p PROFILE_TO_ACCESS_MEMBER_ACCOUNTS -o output.csv

3. Supplying your own account metadata in CSV format

If you have existing account metadata in CSV format, you can import it using the -i parameter. You will need to make sure that the column storing AWS account numbers is titled 'aws_account_id' otherwise the import will fail.

$ python3 ./iam-access-key-report.py -i account-metadata.csv -p PROFILE_TO_ACCESS_MEMBER_ACCOUNTS -o output.csv

Permissions required

You will need the following permissions in the AWS Organization management account or an account that is a delegated administrator for an AWS service:

  • organizations:ListTagsForResources
  • organizations:ListOrganizationalUnitsForParents
  • organizations:ListAccountsForParents
  • organizations:DescribeOrganizationalUnits
  • organizations:ListRoots

To access each member account you will need to provide the name of a role that the tool can use to assume to retrieve access key information. The role in each account must have the following permissions:

  • iam:CreateCredentialReport
  • iam:GetCredentialReport

Usage

Basic usage of the script: $ iam-access-key-report.py [-h] [-s METADATA_SAVE | -l METADATA_LOAD | -i METADATA_CSV_INPUT] [-r ROLE] [-p PROFILE] [-o CSV_OUTPUT]

-h
shows a help messages and exits

-s metadata_file will get all account tags, write them to a file, and then exit. This is if you just want the tag information or if you dont want to have to keep pulling it each time the tool is run

-l metadata_file you can load tag information that has previously been extracted by using (-s)

-i metadata_file.csv ability to import your own account metadata. One column must be labeled 'aws_account_id' which lists account Ids.

-r role provide a role name that can be used to assume into each account. the role will need to already exist or you will need to create it.

p profile the name of a profile configured through the AWS CLI (if you dont specify a profile, the script will use whatever local credentials it can find)

-o csv_output the output file generated in CSV format

How to analyze IAM access key reports

The CSV reports created by this solution can be ingested by AWS services such as Amazon Athena, Amazon Quicksight, or third-party products from our AWS Partners.

Security

See CONTRIBUTING for more information.

License

This library is licensed under the MIT-0 License. See the LICENSE file.

About

No description, website, or topics provided.

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages