Monitoring your AWS IAM configuration and policies is vital aspects to have a secure setup. This recipe monitors several for rules and best practices recommended by AWS and industry leaders.

Security

Help Us Improve!

If you have any suggestions to improve this checklist, please let us know by filling out this form.