Back to controls

Ensure IAM Access Analyzer is enabled in all active regions

IAM Access Analyzer helps identify unintended external access paths to resources.

Category

Controls

Medium

Applies to

AWS

Coverage

null controls, 1 queries

Asset types

1 covered

Overview

IAM Access Analyzer helps identify unintended external access paths to resources.

What this control should detect

Regions where Access Analyzer is not configured according to organization policy.

Remediation guidance

AWS Remediation

Service-Wide (Recommended)

Enable Access Analyzer as part of account vending and region activation standards.

Console (Asset-Level)

  1. Open IAM Console and select Access Analyzer.
  2. Create analyzer in each in-scope region.
  3. Use account or organization analyzer type as required by policy.

AWS CLI (Asset-Level)

aws accessanalyzer create-analyzer --analyzer-name <analyzer-name> --type ACCOUNT

References

  • https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html

Query logic

These are the stored checks tied to this control.

Access analyzers not active

Connectors

AWS

Covered asset types

AccessAnalyzer

Expected check: eq []

{ accessAnalyzers(where: { OR: [ { status_NOT: "ACTIVE" }, { type_NOT_IN: ["ACCOUNT", "ORGANIZATION"] } ] }) { ...AssetFragment } }
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon