AWS IAM Release Notes

AWS IAM Release Notes Document history for the AWS IAM User Guide.

  • IAM condition context keys for service-specific credential APIs
    on September 4, 2025 at 7:00 pm

    IAM now supports two new condition context keys for controlling access to service-specific credential APIs: iam:ServiceSpecificCredentialAgeDays and iam:ServiceSpecificCredentialServiceName. These keys allow you to restrict the creation and management of service-specific credentials based on expiration settings and permitted AWS services.

  • VPC endpoint condition keys for network perimeter controls
    on August 28, 2025 at 7:00 pm

    IAM now supports three new AWS global condition context keys for implementing scalable network perimeter controls: aws:VpceAccount, aws:VpceOrgID, and aws:VpceOrgPaths. These keys help ensure requests come through VPC endpoints owned by specific accounts, organizations, or organizational units, automatically scaling with your VPC endpoint usage without requiring policy updates when you create new endpoints. For more information, see Establish permissions guardrails using data perimeters.

  • IAM SAML federation AWS CloudFormation tutorials
    on August 25, 2025 at 7:00 pm

    IAM added new tutorials for creating SAML identity providers (IdPs) and federated roles using AWS CloudFormation.

  • Additional shared OIDC provider controls for shared OIDC providers
    on August 1, 2025 at 7:00 pm

    IAM now includes Amazon Cognito, Azure Sentinel, Pulumi Cloud, and Vercel global endpoint in the list of shared OIDC identity providers that require explicit evaluation of specific claims in JSON Web Tokens (JWTs).

  • IAM Access Analyzer added internal access analyzers
    on June 16, 2025 at 7:00 pm

    IAM Access Analyzer helps you identify which principals within your organization or account have access to selected business-critical resources. Internal access analyzers support implementing the principle of least privilege by ensuring that your specified resources can only be accessed by the intended principals within your AWS organization or account.

  • Identity provider controls for shared OIDC providers
    on June 6, 2025 at 7:00 pm

    IAM now requires explicit evaluation of specific claims in JSON Web Tokens (JWTs) for recognized shared OIDC identity providers. This security control ensures that only authorized identities from the intended organization can assume roles and access AWS resources.

  • IAMUserChangePassword – Added permissions
    on May 28, 2025 at 7:00 pm

    IAM added permissions to IAMUserChangePassword to allow users specified within a path.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on May 12, 2025 at 7:00 pm

    IAM Access Analyzer added iam:GetAccountAuthorizationDetails to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on March 31, 2025 at 7:00 pm

    IAM Access Analyzer added Amazon S3 directory bucket access points to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • IAM dual-stack endpoint support
    on March 20, 2025 at 7:00 pm

    IAM now provides improved dual-stack endpoint support that enables clients to communicate with IAM using either IPv4 or IPv6 addresses.

  • Updates to policy evaluation logic
    on January 30, 2025 at 7:00 pm

    Enhanced documentation for policy evaluation logic, including improved flow charts and clearer explanations of how AWS evaluates policies to determine whether to allow or deny a request.

  • IAMDeleteRootUserCredentials – Removed permissions
    on January 7, 2025 at 7:00 pm

    IAM removed the iam:DeleteVirtualMFADevice permission from the managed policy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on December 10, 2024 at 7:00 pm

    IAM Access Analyzer added support for permission to retrieve information about Amazon ECR account settings and registry policies to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • AWS managed policy update – New policies
    on November 14, 2024 at 7:00 pm

    IAM added two new policies to scope permissions for privileged root user sessions that you can initiate after you centralize root user access for member accounts in your organization.

  • Centrally manage root access for member accounts
    on November 14, 2024 at 7:00 pm

    You can now manage privileged root user credentials across member accounts in AWS Organizations with centralized root access. Centrally secure the root user credentials of your AWS accounts managed using AWS Organizations to remove and prevent root user credential recovery and access at scale.

  • IAM Access Analyzer added access configuration
    on November 14, 2024 at 7:00 pm

    IAM Access Analyzer added support to configure analyzers to change the scope of which AWS accounts, IAM users, and roles generate findings.

  • Support for AWS Organizations resource control policies (RCPs)
    on November 13, 2024 at 7:00 pm

    Use an AWS Organizations resource control policy (RCP) to define the maximum permissions for resources within accounts in your organization or organizational unit (OU). RCPs limit permissions that identity-based and resource-based policies can grant to resources in accounts within your organization.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on October 29, 2024 at 7:00 pm

    IAM Access Analyzer added support for permission to retrieve information about IAM user and role tags to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • SAML encryption support enhancements
    on June 5, 2024 at 7:00 pm

    Enhanced documentation for SAML encryption support in IAM SAML providers, including improved troubleshooting guidance and clarification on service compatibility.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on May 30, 2024 at 7:00 pm

    IAM Access Analyzer added support for permission to retrieve information about IAM user and role policies to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • Encryption support for SAML identity providers
    on February 4, 2024 at 7:00 pm

    IAM SAML providers now support encrypted assertions in the SAML response from your external IdP. To understand how encryption works with IAM SAML federation, see Using SAML-based federation for API access.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on January 23, 2024 at 7:00 pm

    IAM Access Analyzer added support for permission to retrieve the current state of the block public access for Amazon EC2 snapshots to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on January 11, 2024 at 7:00 pm

    IAM Access Analyzer added DynamoDB streams and tables to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on December 1, 2023 at 7:00 pm

    IAM Access Analyzer added Amazon S3 directory buckets to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on November 26, 2023 at 7:00 pm

    IAM Access Analyzer added IAM actions to the service-level permissions of AccessAnalyzerServiceRolePolicy to support the following actions:

  • IAM Access Analyzer added custom policy checks
    on November 26, 2023 at 7:00 pm

    IAM Access Analyzer now provides custom policy checks to validate that IAM policies adhere to your security standards ahead of deployments.

  • IAM Access Analyzer added unused access analyzers
    on November 26, 2023 at 7:00 pm

    IAM Access Analyzer simplifies inspecting unused access to guide you toward least privilege. IAM Access Analyzer continuously analyzes your accounts to identify unused access and creates a centralized dashboard with findings.

  • IAMAccessAnalyzerReadOnlyAccess – Added permissions
    on November 26, 2023 at 7:00 pm

    IAM Access Analyzer added permissions to IAMAccessAnalyzerReadOnlyAccess to allow you to check whether updates to your policies grant additional access.

  • Action last accessed information and policy generation support for over 60 additional services and actions
    on November 1, 2023 at 7:00 pm

    IAM now supports action last accessed information and generates policies with action-level information for over 60 additional services, along with a list of the actions for which action last accessed information is available.

  • Action last accessed information support for over 140 services
    on September 14, 2023 at 7:00 pm

    IAM now provides action last accessed information for more than 140 services, along with a list of the actions for which action last accessed information is available.

  • Support for multiple multi-factor authentication (MFA) devices for root users and IAM users
    on November 16, 2022 at 7:00 pm

    Now you can to add up to eight MFA devices per user, including FIDO security keys, software time-based one-time password (TOTP) with virtual authenticator applications, or hardware TOTP tokens.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.