{"id":42934,"date":"2021-02-24T00:00:00","date_gmt":"2021-02-24T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/b\/12-azure-aws-security-best-practices.html"},"modified":"2021-02-24T00:00:00","modified_gmt":"2021-02-24T00:00:00","slug":"12-azure-aws-iam-security-best-practices-cloud-advocate","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/","title":{"rendered":"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/b\/12-azure-aws-security-best-practices.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/b\/12-azure-aws-security-best-practices.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"main-subtitle-black\">What is Identity and Access Management (IAM)?<\/span><\/p>\n<p>IAM is one of the core technologies that exists to protect a business, its systems, and data. It is one of the oldest concepts in security, tracing back to the days of keys for castles and secret passwords (think: \u201copen sesame\u201d). The concept of IAM for computers has existed since the 1960s, when the first passwords were used to log in to the Compatible Time Sharing System (CTSS) at Massachusetts Institute of Technology (MIT).<\/p>\n<p>Over the years, IAM systems have fluctuated in difficulty. As more organizations move into the cloud, IAM is becoming increasingly complicated due to additional elements, different term definitions, new and disparate ways to control permissions, and more. For now, you must be careful to ensure that only the appropriate people or systems receive the necessary amount of access to certain systems and data.<\/p>\n<p>Cloud providers like <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/\" target=\"_blank\" rel=\"noopener\">Amazon Web Services<sup>\u00ae<\/sup><\/a> (AWS) and <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/azure\/AccessControl\/\" target=\"_blank\" rel=\"noopener\">Microsoft<sup>\u00ae<\/sup> Azure<sup>\u00ae<\/sup><\/a> have the options that customers need to secure their IAM policies, however, the settings are sometimes unintuitive.<\/p>\n<p>Here are the best practices you should consider for your business and its security:<\/p>\n<p><span class=\"main-subtitle-black\">Identification, Authentication, Authorization and Accountability (IAAA)<\/span><\/p>\n<p>IAM is the process of identifying and controlling the access that is granted to users and services. At its core is IAAA, which is:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Identification is a statement of who a user or service claims to be. Most commonly, a user identification (ID) or email address such as Jameel@email.com.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Authentication is the verification validation of that claim. If the identification of Jameel@email.com is used, the required proof of that claim could be a one-time password from an authenticator that would only be accessible on Jameel\u2019s mobile phone.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Authorization is the granting of permissions to Jameel such as Read, Write, List, etc. Only grant the level of permissions that she needs to do her job.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Accountability is keeping an audit log to track the access request and actions, possibly down to the keystroke, that Jameel performs once she is in the system. This audit log holds her accountable for the actions that she takes in the system.<\/span><\/li>\n<\/ul>\n<p><b>3 stages of identity and access management (IAM):<\/b><\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Provisioning includes the identification and vetting of the user or system. It is necessary to confirm who the user is so that an appropriate account can be created. It is critical that accounts are set up with only the permissions required for that specific role.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Maintenance is completed across the lifetime of this account. Changes that occur to the user&#8217;s job or project would affect the permissions needed. The account needs to reflect the <i>current<\/i> access level required. This is often the area that business\u2019 need improvement in.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">De-provisioning is the end of the account lifecycle. Once access is no longer required, the account should be shut down to protect the business and its data.<\/span><\/li>\n<\/ul>\n<p><b>How to Meet Major Compliance Standards with IAM<br \/><\/b>Effectively managing IAM throughout the account\u2019s lifecycle is critical to maintain compliance with PCI-DSS, EU GDPR, HIPAA, NIST SP 800-53 Rev. 4, or any additional relevant frameworks or laws for your business. Compliance is not only a legal requirement, it is essential for protecting your business, its systems, and data. Exercise caution\u2014compliance is just a starting point. It is possible that your business actually needs stronger controls in place in order to protect it from hackers.<\/p>\n<p><span class=\"main-subtitle-black\">Provisioning IAM Roles<\/span><\/p>\n<p>When a cloud account is opened with a provider such as AWS or Azure, the first user account is created. The root user has full control over everything within the account, and therefore, it should not be used on a regular basis. It is best practice to ensure the account is well protected. If the account is hacked or used inappropriately, all corporate resources in the cloud, including the account itself, could be deleted.<\/p>\n<p>It is also advisable to create multiple AWS accounts for each application stage (Development, Test, Staging, and Production). Multiple <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/aws-multi-account-centralized-management.html\" target=\"_blank\" rel=\"noopener\">AWS accounts can be managed centrally<\/a> from a dedicated account called the identity account.<\/p>\n<p>The first stage of IAM requires identifying the users and systems that need access to a system or data set within your business\u2019 systems. This is required for all environments, on-premises data centers, or cloud solutions. With a cloud account, there are specific steps to set up IAM policies appropriate for your business.<\/p>\n<p><span class=\"body-subhead-title\">1 \u2013 Create Strong Passwords for IAM Roles<\/span><\/p>\n<p>The definition of a strong password is fluid. NIST SP 800-63 Rev. 4 is a national standard for protecting IAM. Conventional knowledge that a password should contain all four options (uppercase, lowercase, symbol, and number) and be regularly changed is no longer best practice. Now, it is recommended to only use two or three of the four possible options. Additionally, NIST recommends that you change the password only when you suspect it has been compromised. Your business should use risk assessment to choose the best password options for optimal security.<\/p>\n<p>Here are some general password tips to consider:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Create a strong password for the root user account and find a secure mechanism to store it.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">If necessary, you can automate changing the passwords on a regular basis, such as <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/password-expiry-in-45-days.html\" target=\"_blank\" rel=\"noopener\">every 45 days<\/a>.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Never share your passwords with anyone.<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">2 \u2013 Set Up Multi-Factor Authentication (MFA)<\/span><\/p>\n<p>It is highly recommended that you set up MFA to secure all accounts. For the root user account, best practice recommendation is to use a <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/root-hardware-mfa.html\" target=\"_blank\" rel=\"noopener\">hardware MFA<\/a> rather than software MFA.<\/p>\n<p>MFA requires two different types of authentication from different factor categories. The three factor categories of authentication are:<\/p>\n<ol>\n<li>Something you know: passwords, passphrases, PINs, and secret or cognitive questions<\/li>\n<li>Something you have: authenticators (like Google Authenticator\u2122), hardware tokens (like RSA tokens), SMS one-time numbers, and asymmetric cryptographic public key certificates<\/li>\n<li>Something you are: biometrics such as facial recognition, fingerprints, retina, etc.<\/li>\n<\/ol>\n<p><span class=\"body-subhead-title\">3 \u2013 Lock Away Root User Access Keys<\/span><\/p>\n<p>Every time an account is created in AWS, an access key is generated by default. It is recommended to delete the access key for the root account, unless you need it for some specific reason. The root user does not usually need an access key, therefore, it further complicates securing the account because it adds more credentials that you must protect.<\/p>\n<p>The same advice applies for all user accounts created. Uncheck the box during the account creation process, and then verify that <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/access-keys-during-initial-iam-user-setup.html\" target=\"_blank\" rel=\"noopener\">each account does not have an access key<\/a>, unless you truly need them.<\/p>\n<p>If the access key is needed for an account, then it should be <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/access-keys-during-initial-iam-user-setup.html\" target=\"_blank\" rel=\"noopener\">rotated on a regular basis<\/a> and never be shared.<\/p>\n<p><span class=\"body-subhead-title\">4 \u2013 Create Individual User Accounts<\/span><\/p>\n<p>After creating an administrative account to use rather than the root user account, you can set up accounts for each of the users or machines within your business. When creating user accounts, AWS recommends that you select the option that requires the user to change the password when they first log on. Make sure that you remove any access permissions for the account in case it ends up being unused. This also eliminates the risk of an account being compromised from a malicious log in. To maximize security and efficiency, it is recommended that you grant permissions with groups.<\/p>\n<p><span class=\"body-subhead-title\">5 \u2013 Use Groups to Assign Permissions to Users<\/span><\/p>\n<p>Groups are an easier way to grant users the access they need. Imagine you are working in a hospital: Setting up accounts for 200 nurses one at a time with their own specific permissions is a lot of work. It is quicker to first determine what access a nurse requires, create a tag with the necessary permissions, and apply the tag to 200 individuals as nurses to automatically grant them the appropriate access.<\/p>\n<p>Using groups is similar to Role Based Access Control (RBAC), and while AWS does use the term \u201croles\u201d, it is in a different context. Terms are used in unexpected ways\u2014in AWS, \u201croles\u201d relates to granting permission to applications or cross-account access.<\/p>\n<p>Within the cloud, the groups you are more likely to create are administrators or developers. There will also be groups for the business users such as accounting, sales, engineers, or even possibly nurses. Try to ensure that the permissions granted to that group are the lowest level that they need.<\/p>\n<p>You should also watch for an orphaned group\u2014a type of group that has no users attached to them. Make sure that <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/unused-iam-group.html\" target=\"_blank\" rel=\"noopener\">unused groups<\/a> are removed so that unauthorized users can\u2019t be mistakenly or maliciously attached.<\/p>\n<p><span class=\"body-subhead-title\">6 \u2013 Grant Least Privilege<\/span><\/p>\n<p>Within each group, it is essential that a user is granted the lowest level of access possible that still allows them to do their job. This is the security concept known as least privilege. It is a straightforward concept, but it is very difficult to achieve. Too much access can result in data being compromised or exfiltrated. This could happen accidentally, maliciously, or it could be a hacker that gains access to that account and, because of its level of access, is able to create chaos.<\/p>\n<p>Best practice is to grant only the bare minimum permissions that this group needs and then add-on from there as necessary. Being too lenient from the beginning and granting a lot of permissions with the intention of slowly locking it down leads to data being compromised. As you add new users to an existing group, they will inherit all of the permissions currently granted to that group. It is likely that at some point a user will have more permissions within a system, application, database, etc., than they should. Most users will not attempt to maliciously hurt a business, but accidents do happen. There are many network administrators who have accidentally deleted a production database, thus, it is necessary to protect the users from similar mistakes.<\/p>\n<p>Permissions, privileges, or policy actions that can be granted are: List, Read, Write, Permissions Management and Tagging. In order to grant permissions, a policy is created and then attached to the group\u2014similar to firewall policy creation. Essentially, a policy is a list of rules.<\/p>\n<p><span class=\"body-subhead-title\">7 \u2013 Use Customer Managed Policies<\/span><\/p>\n<p>A user, group, or role can perform specific actions within the cloud based on the policy it is attached to. A policy contains a list of the actions that someone or something is allowed to perform, which are grouped into the categories of List, Read, Write, Permission Management and Tagging. Creating these policies from scratch can be an overwhelming task. The cloud providers have default policies created for your use; AWS calls these <a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/access_policies_managed-vs-inline.html\" target=\"_blank\" rel=\"noopener\">managed policies<\/a>. These default policies may be sufficient for your use, greatly simplifying your work.<\/p>\n<p>At AWS, you can also create your own policies. There are two types of polices: customer managed or inline. When creating policies, it is best to use customer managed policies instead of <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/iam-group-with-inline-policies.html\" target=\"_blank\" rel=\"noopener\">inline policies<\/a>, because managed policies (customer or AWS) can be seen and controlled from one place\u2014the console. Once you create a managed policy, you can attach it to as many different AWS resources as you need.<\/p>\n<p>Inline policies are unique to a user, group, or role, and therefore cannot be attached to another resource\u2014they will have to be recreated if you want to use it for a different instance. The more policies you have means more places you have to look to review them, making it harder to manage access at a least privilege level. Use inline policies only as needed\u2014if you already have inline policies, it is possible to <a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/best-practices.html#best-practice-managed-vs-inline\" target=\"_blank\" rel=\"noopener\">convert them to customer managed policies<\/a>.<\/p>\n<p><span class=\"body-subhead-title\">8 \u2013 Use Separation of Duties<\/span><\/p>\n<p>Creation of accounts and policies allows users or services to access what they require from a cloud, network, or environment. For enhanced security, this set of tasks should be separated between different employees. This is known as separation of duties or the two-person rule, which prevents just one person from being able to create a user, group, or policy (and assign it). For this process, oversight is necessary for catching potential mistakes and stopping intentional, malicious attacks. Verifying all activities ensures strong security for your cloud.<\/p>\n<p>In AWS, you can enable <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/master-and-manager-role.html\" target=\"_blank\" rel=\"noopener\">IAM Master and IAM Manager<\/a> to work together to provide IAM users and roles the access to the right permissions. These two roles should be performed by two different employees.<\/p>\n<p>Want to never have to manually check to adherence to the design principles of the well-architected framework again \u2013 including IAM best practices? Have your multi-cloud infrastructure configurations scanned for adherence to over 750 industry best practices by signing up for our free trial.<\/p>\n<p><span class=\"main-subtitle-black\">IAM Role Maintenance &amp; Management<\/span><\/p>\n<p>Users may change jobs, positions, teams, etc., therefore it is necessary to revise their permissions. This is a cumbersome process to oversee all the users, groups, roles, and policies that grant them permissions. Luckily, there are tools to help this process.<\/p>\n<p><span class=\"body-subhead-title\">9 \u2013 Review IAM Permissions<\/span><\/p>\n<p>Policies should be reviewed regularly to ensure that the number of permissions included is at a least-privileged level. You can access the policy summary to see what permissions have been granted from the IAM dashboard. Find the role that you want to review and then click on the Show Policy link. <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/iam-role-policy-too-permissive.html\" target=\"_blank\" rel=\"noopener\">Ensure that the policy is not too permissive<\/a>, and <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/policies-with-full-administrative-privileges.html\" target=\"_blank\" rel=\"noopener\">watch for any policy that grants full access<\/a> to the users, roles, or groups.<\/p>\n<p>There are also combinations of commands in a policy that, when combined incorrectly, can lead to policies that are too permissive. One of the combinations to watch out for is Effect and Allow with NotAction. The latter allows you to create a shorter policy by restricting what someone can do. Evidently, if combined incorrectly with other commands, the policy could end up <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/policy-with-effect-allow-and-not-action.html\" target=\"_blank\" rel=\"noopener\">allowing too much access<\/a>.<\/p>\n<p><span class=\"body-subhead-title\">10 \u2013 Refine Permissions Using Last Accessed Information<\/span><\/p>\n<p>Another way to determine if a policy has granted too many permissions is to review the last accessed information for a user, group, role, or policy. The last accessed information is in the Access Advisor tab within the IAM console. If you find that permissions are unused, then they should be removed to reduce the policy to a least privilege level. Essentially\u2014if they do not use it, they do not need it.<\/p>\n<p>Similarly, you should watch for <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/unused-iam-user.html\" target=\"_blank\" rel=\"noopener\">users accounts that are unused<\/a>, as well as <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/unused-iam-group.html\" target=\"_blank\" rel=\"noopener\">groups that have zero users<\/a>.<\/p>\n<p><span class=\"body-subhead-title\">11 \u2013 Watch for Users that Can Edit Policy Actions, but are Not Authorized<\/span><\/p>\n<p>Only certain administrator should create, delete, attach, or edit policies. If a user\u2019s account is assigned those permissions, it is critical to determine if that is appropriate. If it is inappropriate, the permissions should be removed immediately. To determine this, <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/IAM\/edit-iam-policy-permission.html\" target=\"_blank\" rel=\"noopener\">review the Permissions tab<\/a> within a specific user&#8217;s account from the IAM console. Check if \u201callow\u201d is associated with any permissions related to policies. If the user should not have that access, it is necessary to edit the policy.<\/p>\n<p><span class=\"body-subhead-title\">12 \u2013 View CloudTrail Events to Further Refine Permissions<\/span><\/p>\n<p>Logging is a very important security control that needs to be <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/CloudTrail\/cloudtrail-enabled.html\" target=\"_blank\" rel=\"noopener\">correctly configured<\/a> so it captures the events that you are worried about, such as <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/CloudTrail\/data-events.html\" target=\"_blank\" rel=\"noopener\">CloudTrail data events<\/a>. It is also necessary to review the log output (in AWS these are the <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/CloudTrail\/\" target=\"_blank\" rel=\"noopener\">CloudTrails<\/a>) by looking for unauthorized events and then modifying the policy to reduce the access level to least privilege.<\/p>\n<p><span class=\"main-subtitle-black\">De-provisioning IAM Accounts<\/span><\/p>\n<p>When accounts are no longer needed, they should be de-provisioned. This includes the accounts that have never been used and in particular, the user accounts that were assigned to employees who have now left the business, changed jobs, joined new projects, etc. Ideally, it should be part of the standard operating process to remove accounts for users that are leaving the business. Although it is a considerable amount of work, it is critical that it is done. The many best practices listed above will help to find these accounts, so you can ensure your business\u2019 valuable data is secure.<\/p>\n<p>Interested in knowing how well-architected your multi-cloud environment is? Check out the <a href=\"https:\/\/go.trendmicro.com\/srvy\/public-cloud-risk-assessment\/\" target=\"_blank\" rel=\"noopener\">free guided public cloud risk assessment<\/a> and get your results in just minutes.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/b\/12-azure-aws-security-best-practices.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn the 12 Azure &#038; AWS identity and access management (IAM) security best practices, and how to optimize your company\u2019s cloud platform protection. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42935,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9503,9505,9502,9530,9501,9504,9572,9507,9500],"class_list":["post-42934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-article","tag-trend-micro-devops-aws","tag-trend-micro-devops-azure","tag-trend-micro-devops-best-practices","tag-trend-micro-devops-cloud-native","tag-trend-micro-devops-compliance","tag-trend-micro-devops-conformity","tag-trend-micro-devops-multi-cloud","tag-trend-micro-devops-workload-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1282\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate\",\"datePublished\":\"2021-02-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/\"},\"wordCount\":2651,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg\",\"keywords\":[\"Trend Micro DevOps : Article\",\"Trend Micro DevOps : AWS\",\"Trend Micro DevOps : Azure\",\"Trend Micro DevOps : Best Practices\",\"Trend Micro DevOps : Cloud Native\",\"Trend Micro DevOps : Compliance\",\"Trend Micro DevOps : Conformity\",\"Trend Micro DevOps : Multi Cloud\",\"Trend Micro DevOps : Workload Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/\",\"name\":\"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg\",\"datePublished\":\"2021-02-24T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg\",\"width\":1282,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/12-azure-aws-iam-security-best-practices-cloud-advocate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-devops-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/","og_locale":"en_US","og_type":"article","og_title":"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-24T00:00:00+00:00","og_image":[{"width":1282,"height":700,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate","datePublished":"2021-02-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/"},"wordCount":2651,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg","keywords":["Trend Micro DevOps : Article","Trend Micro DevOps : AWS","Trend Micro DevOps : Azure","Trend Micro DevOps : Best Practices","Trend Micro DevOps : Cloud Native","Trend Micro DevOps : Compliance","Trend Micro DevOps : Conformity","Trend Micro DevOps : Multi Cloud","Trend Micro DevOps : Workload Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/","url":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/","name":"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg","datePublished":"2021-02-24T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/12-azure-aws-iam-security-best-practices-cloud-advocate.jpg","width":1282,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/12-azure-aws-iam-security-best-practices-cloud-advocate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/"},{"@type":"ListItem","position":3,"name":"12 Azure &amp; AWS IAM Security Best Practices Cloud Advocate"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42934"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42934\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42935"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}