How can this be accomplished?
Use AWS Config to review the IAM policy assigned to users before and after the incident.
Run the GenerateCredentialReport via the AWS CLI, and copy the output to Amazon S3 daily for auditing purposes.
Copy AWS CloudFormation templates to S3, and audit for changes from the template.
Use Amazon EC2 Systems Manager to deploy images, and review AWS CloudTrail logs for changes.
Explanations:
AWS Config can track changes to IAM policies and user permissions, making it an effective tool to audit changes before and after an incident.
TheGenerateCredentialReportprovides a snapshot of IAM users’ credentials, but it does not capture real-time changes to IAM permissions or track policy changes.
AWS CloudFormation templates only manage infrastructure deployment, and changes to IAM permissions via these templates aren’t sufficient for auditing user permissions.
EC2 Systems Manager is used for managing EC2 instances, not for tracking IAM permission changes. CloudTrail logs provide some insight, but AWS Config is the better solution.