{"version":"1.0","provider_name":"CloudThat Resources","provider_url":"https:\/\/www.cloudthat.com\/resources","author_name":"Deepak Surendran","author_url":"https:\/\/www.cloudthat.com\/resources\/author\/deepak-surendran\/","title":"AWS IAM Access Analyzer for Enhanced Resource Protection","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vuBaftJ89P\"><a href=\"https:\/\/www.cloudthat.com\/resources\/blog\/aws-iam-access-analyzer-for-enhanced-resource-protection\">AWS IAM Access Analyzer for Enhanced Resource Protection<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cloudthat.com\/resources\/blog\/aws-iam-access-analyzer-for-enhanced-resource-protection\/embed\/#?secret=vuBaftJ89P\" width=\"600\" height=\"338\" title=\"&#8220;AWS IAM Access Analyzer for Enhanced Resource Protection&#8221; &#8212; CloudThat Resources\" data-secret=\"vuBaftJ89P\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2024\/02\/Maximizing-Cloud-Infrastructure-with-Optimal-Performance-and-Security-1.webp","thumbnail_width":890,"thumbnail_height":471,"description":"AWS recently launched two new features to improve the AWS IAM Access Analyzer functionalities by analyzing unused permissions that are granted but not in use and validating the newly authored policies, thereby limiting permissions."}