AWS Identity and Access Manager (IAM) Access Analyzer now supports unused access findings, internal access findings, and custom policy checks in the AWS GovCloud (US-East and US-West) Regions to help guide you towards least privilege.
IAM Access Analyzer continuously analyzes your accounts to identify unused access and surfaces findings to highlight unused roles, unused access keys for IAM users, and unused passwords for IAM users. For active IAM roles and users, the findings provide visibility into unused services and actions. With internal access findings, you can identify who within your AWS organization has access to your Amazon S3, Amazon DynamoDB, or Amazon Relational Database Service (RDS) resources. It uses automated reasoning to evaluate all identity policies, resource policies, service control policies (SCPs), and resource control policies (RCPs) to surface all IAM users and roles that have access to your selected critical resources. After the new analyzers are enabled in the IAM console, the updated dashboard highlights your AWS accounts and resources that have the most findings and provides a breakdown of findings by type. Security teams can respond to new findings in two ways: taking immediate action to fix unintended access, or setting up automated notifications through Amazon EventBridge to engage development teams for remediation.
Custom policy checks also use the power of automated reasoning to help security teams proactively detect nonconformant updates to policies. For example, IAM policy changes that are more permissive than their previous version. Security teams can use these checks to streamline their reviews, automatically approving policies that conform with their security standards, and inspecting more deeply when they don’t.
To learn more about IAM Access Analyzer:
- See the documentation
- Review the pricing
Categories:
Source: Amazon Web Services
Latest Posts
- GCP Release Notes: January 23, 2026

- Dynamics 365 Contact Center – Customize transfers and consults for queues, representatives [MC1221931]
![Dynamics 365 Contact Center – Customize transfers and consults for queues, representatives [MC1221931] 3 pexels anniroenkae 2457284](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- (Updated) Microsoft Defender for Office 365: Admins can block external users in Microsoft Teams from Defender Portal [MC1200058]
![(Updated) Microsoft Defender for Office 365: Admins can block external users in Microsoft Teams from Defender Portal [MC1200058] 4 pexels francesco ungaro 669319](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- (Updated) Microsoft Viva Engage: Smarter delivery of Community Announcement notifications [MC1143276]
![(Updated) Microsoft Viva Engage: Smarter delivery of Community Announcement notifications [MC1143276] 5 pexels pachon in motion 426015731 26559443](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)


![Dynamics 365 Contact Center – Customize transfers and consults for queues, representatives [MC1221931] 3 pexels anniroenkae 2457284](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-anniroenkae-2457284-150x150.webp)
![(Updated) Microsoft Defender for Office 365: Admins can block external users in Microsoft Teams from Defender Portal [MC1200058] 4 pexels francesco ungaro 669319](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-francesco-ungaro-669319-150x150.webp)
![(Updated) Microsoft Viva Engage: Smarter delivery of Community Announcement notifications [MC1143276] 5 pexels pachon in motion 426015731 26559443](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-pachon-in-motion-426015731-26559443-150x150.webp)
![(Updated) New feature in Microsoft Viva Pulse to enable delegation [MC1104314] 7 (Updated) New feature in Microsoft Viva Pulse to enable delegation [MC1104314]](https://mwpro.co.uk/wp-content/uploads/2025/06/danbo-4326940_1920-96x96.webp)