![Identify unused IAM roles and remove them confidently with the last used timestamp | AWS Security Blog Identify unused IAM roles and remove them confidently with the last used timestamp | AWS Security Blog](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2019/11/18/Figure2-final-blurred.png)
Identify unused IAM roles and remove them confidently with the last used timestamp | AWS Security Blog
![Creating Zero Trust AWS Policies. ACM.36: Tools and techniques to create… | by Teri Radichel | Cloud Security | Medium Creating Zero Trust AWS Policies. ACM.36: Tools and techniques to create… | by Teri Radichel | Cloud Security | Medium](https://miro.medium.com/v2/resize:fit:1400/1*sZpVuKuqol3abyog1pE26w.png)
Creating Zero Trust AWS Policies. ACM.36: Tools and techniques to create… | by Teri Radichel | Cloud Security | Medium
![New! Set permission guardrails confidently by using IAM access advisor to analyze service-last-accessed information for accounts in your AWS organization | AWS Security Blog New! Set permission guardrails confidently by using IAM access advisor to analyze service-last-accessed information for accounts in your AWS organization | AWS Security Blog](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2019/06/20/fig4_permission-guardrails.png)
New! Set permission guardrails confidently by using IAM access advisor to analyze service-last-accessed information for accounts in your AWS organization | AWS Security Blog
![Building Least Privilege Policies with the AWS Policy Advisor - and a Demo with the Serverless Application Framework Building Least Privilege Policies with the AWS Policy Advisor - and a Demo with the Serverless Application Framework](https://dwmkerr.com/building-least-privilege-permissions-aws/images/generate-policy.png)
Building Least Privilege Policies with the AWS Policy Advisor - and a Demo with the Serverless Application Framework
![Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles | AWS Security Blog Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles | AWS Security Blog](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2021/04/20/Review-last-accessed-information-3.png)
Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles | AWS Security Blog
![Building Least Privilege Policies with the AWS Policy Advisor - and a Demo with the Serverless Application Framework Building Least Privilege Policies with the AWS Policy Advisor - and a Demo with the Serverless Application Framework](https://dwmkerr.com/building-least-privilege-permissions-aws/images/access-analyser.png)
Building Least Privilege Policies with the AWS Policy Advisor - and a Demo with the Serverless Application Framework
![AWS Tutorials - 58 - What/Why is CloudShell || IAM - Access Advisor || IAM - Credential Report - YouTube AWS Tutorials - 58 - What/Why is CloudShell || IAM - Access Advisor || IAM - Credential Report - YouTube](https://i.ytimg.com/vi/GdlAcq3Ek_s/maxresdefault.jpg)