Netskope Community
Continuing our blog series on AWS Best Practices, we've published two additional blogs looking at real-world AWS environments and practices around IAM policies and password policies, along with easy steps you can take to reduce. Our findings include:
- 4% of IAM policies grant full admin privileges
- 47%-67% of IAM users are using inline or directly attached policies
- 73% of account password policies have password length < 14 characters
- 80% of IAM user accounts have a password reuse setting < 24 times
Here are some concrete steps that can be taken to reduce risk related to IAM Policies and Password Policies:
Along with our prior blog posts on root account security and IAM User security, these latest blog posts round out our look at IAM Best Practices for AWS. In the near future, we'll be publishing additional blogs around AWS best practices around networking, storage, and logging.
What are your thoughts on the following?
We'd love to hear about your experiences with locking down IAM and how we can help at Netskope.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Here are some of the popular articles from this blog.
In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below
Sign In