aws-iam
SKILL.md
AWS IAM
Manage identity and access management.
List users
aws iam list-users --query 'Users[].{Name:UserName,Created:CreateDate,LastUsed:PasswordLastUsed}' --output table
List roles
aws iam list-roles --query 'Roles[].{Name:RoleName,Created:CreateDate,Path:Path}' --output table | head -30
Get role details
aws iam get-role --role-name my-role | jq '{RoleName: .Role.RoleName, Arn: .Role.Arn, AssumeRolePolicy: .Role.AssumeRolePolicyDocument}'
List attached policies (role)
aws iam list-attached-role-policies --role-name my-role --query 'AttachedPolicies[].{Name:PolicyName,Arn:PolicyArn}' --output table
List inline policies (role)
aws iam list-role-policies --role-name my-role --output table
Get policy document
aws iam get-policy-version --policy-arn arn:aws:iam::123456789:policy/my-policy \
--version-id v1 | jq '.PolicyVersion.Document'
List access keys
aws iam list-access-keys --user-name my-user --query 'AccessKeyMetadata[].{KeyId:AccessKeyId,Status:Status,Created:CreateDate}' --output table
Get account summary
aws iam get-account-summary | jq '.SummaryMap | {Users, Roles, Policies, Groups, MFADevices: .MFADevicesInUse}'
Simulate policy
aws iam simulate-principal-policy \
--policy-source-arn arn:aws:iam::123456789:role/my-role \
--action-names s3:GetObject s3:PutObject \
--resource-arns "arn:aws:s3:::my-bucket/*" \
--query 'EvaluationResults[].{Action:EvalActionName,Decision:EvalDecision}' --output table
Notes
- IAM is global (not region-specific).
- Use
simulate-principal-policyto test permissions without making real calls. - Never create or rotate access keys without user confirmation.
Weekly Installs
2
Repository
thinkfleetai/th…t-engineFirst Seen
13 days ago
Security Audits
Installed on
opencode2
gemini-cli2
claude-code2
github-copilot2
codex2
kimi-cli2