IAM Permissions

Required Identity and Access Management (IAM) permissions to use keyup.

Required IAM Policy Permissions

There are minimal Identity and Access Management (IAM) permissions required to return valid results for an IAM user. If an iam user referenced in the local awscli configuration file does not have adequate permissions to return access key information, keyup will simply skip the user and omit the iam user from the key report.

The following IAM policy must be assigned to each IAM user either via group policy assignment or directly attached to the IAM user identity in the AWS Account.

  "Version": "2012-10-17",
  "Statement": [
      "Action": [
      "Resource": [
      "Effect": "Allow",
      "Sid": "iamAccountInfo"
      "Action": [
      "Resource": [
      "Effect": "Allow",
      "Sid": "iamUserChangeOwnAccessKeys"

Back to IAM Permissions Top

IAM Policy Details

The iam policy provides explicit permissions to an individual user to read and update only the user’s own iam access keys.


The IAM policy permissions allow keyup to rotate access keys without requiring a Multi-factor Authorization (MFA, 2-factor) code. This is a recommended policy provided all other permissions to provision or modify resources in the AWS Account mandate a 2-factor MFA code.

an attacker can obtain keys with a compromised iam user account, but can nothing with them.


  • Required to query the AWS Account for an assigned alias (human-readable account name).
  • Not all AWS Accounts have an alias assigned.
  • If no alias is returned, the AWS Account Id is displayed instead.


  • Required for keyup to generate new access keys when rotating keys.


  • Required by keyup to delete deprecated access keys after a new set is generated.


  • Required by keyup to list access keys for a given IAM user.


  • Required by keyup to retrieve access key meta data (data about a user’s key set).

Back to IAM Permissions top

Table Of Contents