AWS IAM Release Notes

AWS IAM Release Notes Document history for the AWS IAM User Guide.

  • IAM Access Analyzer added internal access analyzers
    on June 16, 2025 at 7:00 pm

    IAM Access Analyzer helps you identify which principals within your organization or account have access to selected business-critical resources. Internal access analyzers support implementing the principle of least privilege by ensuring that your specified resources can only be accessed by the intended principals within your AWS organization or account.

  • Identity provider controls for shared OIDC providers
    on June 6, 2025 at 7:00 pm

    IAM now requires explicit evaluation of specific claims in JSON Web Tokens (JWTs) for recognized shared OIDC identity providers. This security control ensures that only authorized identities from the intended organization can assume roles and access AWS resources.

  • IAMUserChangePassword – Added permissions
    on May 28, 2025 at 7:00 pm

    IAM added permissions to IAMUserChangePassword to allow users specified within a path.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on May 12, 2025 at 7:00 pm

    IAM Access Analyzer added iam:GetAccountAuthorizationDetails to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on March 31, 2025 at 7:00 pm

    IAM Access Analyzer added Amazon S3 directory bucket access points to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • IAM dual-stack endpoint support
    on March 20, 2025 at 7:00 pm

    IAM now provides improved dual-stack endpoint support that enables clients to communicate with IAM using either IPv4 or IPv6 addresses.

  • Updates to policy evaluation logic
    on January 30, 2025 at 7:00 pm

    Enhanced documentation for policy evaluation logic, including improved flow charts and clearer explanations of how AWS evaluates policies to determine whether to allow or deny a request.

  • IAMDeleteRootUserCredentials – Removed permissions
    on January 7, 2025 at 7:00 pm

    IAM removed the iam:DeleteVirtualMFADevice permission from the managed policy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on December 10, 2024 at 7:00 pm

    IAM Access Analyzer added support for permission to retrieve information about Amazon ECR account settings and registry policies to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • Centrally manage root access for member accounts
    on November 14, 2024 at 7:00 pm

    You can now manage privileged root user credentials across member accounts in AWS Organizations with centralized root access. Centrally secure the root user credentials of your AWS accounts managed using AWS Organizations to remove and prevent root user credential recovery and access at scale.

  • IAM Access Analyzer added access configuration
    on November 14, 2024 at 7:00 pm

    IAM Access Analyzer added support to configure analyzers to change the scope of which AWS accounts, IAM users, and roles generate findings.

  • AWS managed policy update – New policies
    on November 14, 2024 at 7:00 pm

    IAM added two new policies to scope permissions for privileged root user sessions that you can initiate after you centralize root user access for member accounts in your organization.

  • Support for AWS Organizations resource control policies (RCPs)
    on November 13, 2024 at 7:00 pm

    Use an AWS Organizations resource control policy (RCP) to define the maximum permissions for resources within accounts in your organization or organizational unit (OU). RCPs limit permissions that identity-based and resource-based policies can grant to resources in accounts within your organization.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on October 29, 2024 at 7:00 pm

    IAM Access Analyzer added support for permission to retrieve information about IAM user and role tags to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • SAML encryption support enhancements
    on June 5, 2024 at 7:00 pm

    Enhanced documentation for SAML encryption support in IAM SAML providers, including improved troubleshooting guidance and clarification on service compatibility.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on May 30, 2024 at 7:00 pm

    IAM Access Analyzer added support for permission to retrieve information about IAM user and role policies to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • Encryption support for SAML identity providers
    on February 4, 2024 at 7:00 pm

    IAM SAML providers now support encrypted assertions in the SAML response from your external IdP. To understand how encryption works with IAM SAML federation, see Using SAML-based federation for API access.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on January 23, 2024 at 7:00 pm

    IAM Access Analyzer added support for permission to retrieve the current state of the block public access for Amazon EC2 snapshots to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on January 11, 2024 at 7:00 pm

    IAM Access Analyzer added DynamoDB streams and tables to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on December 1, 2023 at 7:00 pm

    IAM Access Analyzer added Amazon S3 directory buckets to the service-level permissions of AccessAnalyzerServiceRolePolicy.

  • IAM Access Analyzer added custom policy checks
    on November 26, 2023 at 7:00 pm

    IAM Access Analyzer now provides custom policy checks to validate that IAM policies adhere to your security standards ahead of deployments.

  • AccessAnalyzerServiceRolePolicy – Added permissions
    on November 26, 2023 at 7:00 pm

    IAM Access Analyzer added IAM actions to the service-level permissions of AccessAnalyzerServiceRolePolicy to support the following actions:

  • IAMAccessAnalyzerReadOnlyAccess – Added permissions
    on November 26, 2023 at 7:00 pm

    IAM Access Analyzer added permissions to IAMAccessAnalyzerReadOnlyAccess to allow you to check whether updates to your policies grant additional access.

  • IAM Access Analyzer added unused access analyzers
    on November 26, 2023 at 7:00 pm

    IAM Access Analyzer simplifies inspecting unused access to guide you toward least privilege. IAM Access Analyzer continuously analyzes your accounts to identify unused access and creates a centralized dashboard with findings.

  • Action last accessed information and policy generation support for over 60 additional services and actions
    on November 1, 2023 at 7:00 pm

    IAM now supports action last accessed information and generates policies with action-level information for over 60 additional services, along with a list of the actions for which action last accessed information is available.

  • Action last accessed information support for over 140 services
    on September 14, 2023 at 7:00 pm

    IAM now provides action last accessed information for more than 140 services, along with a list of the actions for which action last accessed information is available.

  • Support for multiple multi-factor authentication (MFA) devices for root users and IAM users
    on November 16, 2022 at 7:00 pm

    Now you can to add up to eight MFA devices per user, including FIDO security keys, software time-based one-time password (TOTP) with virtual authenticator applications, or hardware TOTP tokens.

  • IAM Access Analyzer support for new resource types
    on October 25, 2022 at 7:00 pm

    IAM Access Analyzer added support for the following resource types:

  • U2F deprecation and WebAuthn/FIDO update
    on May 31, 2022 at 7:00 pm

    Removed mentions of U2F as an MFA option and added information about WebAuthn, FIDO2, and FIDO security keys.

  • Updates to resilience in IAM
    on May 16, 2022 at 7:00 pm

    Added information about maintaining access to IAM credentials when an event disrupts communication between AWS Regions.

  • New global condition keys for resources
    on April 27, 2022 at 7:00 pm

    You can now control access to resources based on the account, Organizational Unit (OU), or organization in AWS Organizations that contains your resources. You can use the aws:ResourceAccount, aws:ResourceOrgID, and aws:ResourceOrgPaths global condition keys in an IAM policy.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.