NOTA: Aún no se completó la actualización de la versión en español a v2, sugerimos usar la versión en Inglés por ahora.
Do not provision perpetual access for temporary esporadical actions, such as troubleshooting. When a task requires temporary elevated access your employees should be able to request that temporary access, ideally passing through an approval workflow, and the temporary permissions should be audited and controlled by a different employee.
One approach to implement this recommendation is to use a solution that AWS published, called Temporary Elevated Access Management (TEAM) that allows you to grant temporary access, and to monitor activity of the privileged session in CloudTrail, and if needed you can revoke the session.
Once access is revoked or time expires, the session ends and all further action is denied.
Privileged Access Management (PAM) solutions store credentials for temporary access that can be requested when needed.
CyberArk, Okta and Ermetic provide integration with IAM identity center for temporary access using temporary credentials.
If using another 3rd party PAM Solution it’s recommended to analyze how they integrate, if they are granting temporary credentials or and not using durable credentials such as Access Keys, or sharing the actual credentials to the user.
https://aws.amazon.com/blogs/security/temporary-elevated-access-management-with-iam-identity-center/