返回顶部
w

watadot-aws-iam

IAM security patterns by Watadot Studio. Manage users, roles, and policy verification.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
224
下载量
0
收藏
概述
安装方式
版本历史

watadot-aws-iam

# AWS IAM Skills Security-first identity and access management patterns. ## 🚀 Core Commands ### Identity Audit ```bash # List all users with ARN and creation date aws iam list-users --query "Users[].{User:UserName,Arn:Arn,Date:CreateDate}" --output table # Find unused access keys (90+ days) aws iam list-users --query "Users[].UserName" --output text | xargs -I {} aws iam list-access-keys --user-name {} --query "AccessKeyMetadata[?Status==\`Active\` && CreateDate < \`2025-12-31\`]" ``` ### Role Orchestration ```bash # Assume a role and get temporary credentials aws sts assume-role --role-arn <role-arn> --role-session-name "OpenClawSession" # List policies attached to a specific role aws iam list-attached-role-policies --role-name <role-name> --query "AttachedPolicies[].PolicyName" ``` ### Policy Verification ```bash # Get effective policy document aws iam get-policy-version --policy-arn <arn> --version-id <id> --query "PolicyVersion.Document" ``` ## 🧠 Best Practices 1. **Never use Root**: Use IAM users or SSO roles for daily operations. 2. **Short-lived Credentials**: Prefer `sts assume-role` over permanent access keys. 3. **MFA Enforcement**: Enable Multi-Factor Authentication for all console and sensitive CLI access. 4. **Access Analyzer**: Regularly run IAM Access Analyzer to find unintended public or cross-account access.

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 watadot-aws-iam-1776379202 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 watadot-aws-iam-1776379202 技能

通过命令行安装

skillhub install watadot-aws-iam-1776379202

下载 Zip 包

⬇ 下载 watadot-aws-iam v1.0.0

文件大小: 1.46 KB | 发布时间: 2026-4-17 16:31

v1.0.0 最新 2026-4-17 16:31
- Initial release of watadot-aws-iam.
- Provides IAM security patterns for managing AWS users, roles, and policy verification.
- Includes audit commands for users and access keys, role orchestration, and policy inspection.
- Documents security best practices, including MFA enforcement and use of Access Analyzer.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部