Updated on 2025-11-07 GMT+08:00

Reviewing Findings

After you enable IAM Access Analyzer, you can review any findings to determine whether the access identified in the finding is intended or unintended. If the access is unintended, you can make adjustments as needed. You can also review findings to determine similar findings for intended access, and then archive these findings by referring to Creating Archive Rules.

Prerequisites

An access analyzer has been created and at least one analysis has been conducted.

Reviewing External Access Findings

  1. Log in to the new IAM console.
  2. In the navigation pane, choose Access Analyzer > External Access.
  3. In the upper left corner of the displayed page, select a target analyzer from the drop-down list.

    Figure 1 Selecting an analyzer

  4. Click the Active, Resolved, Archived, or All tab to view the findings.

    • Active: displays findings that are not processed.
    • Resolved: displays the findings that have been resolved. The status of an active finding changes to Resolved after it is resolved.

      Resolved findings will be deleted 90 days after the last update to the findings. Active and archived findings will not be deleted unless you delete the analyzers that generate them.

    • Archived: displays the findings that are archived. You can archive findings that do not need to be processed so that you can focus on unintended access findings.
    • All: displays all findings generated by your access analyzer.

  5. View basic information about the findings.

    Table 1 Parameters about findings

    Parameter

    Description

    Finding ID

    Unique ID assigned to the finding. You can click a finding ID to view details about the finding.

    Resource

    Type and URN of a resource analyzed by the external access analyzer.

    Resource Owner Account

    Account ID of the resource owner.

    External Principal

    Principal that is not within your zone of trust but is granted access to the resource.
    • all_principal: any principal
    • account: any principal under a specific account
    • all_user_in_account: all users under a specified account
    • all_agency_in_account: all agencies and trust agencies under a specific account
    • all_identity_provider_in_account: all federated identity providers under a specific account
    • specific_user: specific users under a specific account
    • specific_agency: specific agencies or trust agencies under a specific account
    • specific_group: specific user groups under a specific account
    • specific_identity_provider: federated identity providers under a specific account

    Condition

    Condition from the policy statement that grants the access. It can be a global or service-specific condition key.

    Shared Through

    The way of granting access. The access can be granted in either of the following ways:

    • bucket_policy: OBS bucket policy
    • bucket_acl: OBS bucket ACL

    Access Level

    Level of access granted to the external principal. Access levels include:

    • List: Permissions to list resources but not to view the content of any resources.
    • Write: Permissions to create, modify, or delete resources.
    • Read: Permissions to view but not to modify any resources.
    • Tag: Permissions to modify resource tags.
    • Permissions: Permissions to grant or modify permissions to resources.

    Updated

    The time when the finding was generated or updated.

  6. Click a finding ID to view details about the finding.

Reviewing Unused Access Findings

  1. Log in to the new IAM console.
  2. In the navigation pane, choose Access Analyzer > Unused Access.
  3. In the upper left corner of the displayed page, select a target analyzer from the drop-down list.

    Figure 2 Selecting an analyzer

  4. Click the Active, Resolved, Archived, or All tab to view the findings.

    • Active: displays the findings that are not processed.
    • Resolved: displays the findings that have been resolved. The status of an active finding changes to Resolved after it is resolved.
    • Archived: displays the findings that are archived. You can archive findings that do not need to be processed so that you can focus on unintended access findings.
    • All: displays all findings generated by your access analyzer.

  5. View basic information about the findings.

    Table 2 Parameters about findings

    Parameter

    Description

    Finding ID

    Unique ID assigned to the finding. You can click a finding ID to view details about the finding.

    Finding Type

    Types of unused access findings, including:

    • Unused access key
    • Unused agencies or trust agencies
    • Unused password
    • Unused permissions

    Resource

    Type and URN of a resource analyzed by an unused access analyzer

    Resource Owner Account

    Account ID of the resource owner. This parameter is displayed when unused access findings are filtered.

    Updated

    The time when the finding was generated or updated.

  6. Click a finding ID to view details about the finding.

Reviewing Best Practice Compliance Findings

  1. Log in to the new IAM console.
  2. In the navigation pane, choose Access Analyzer > Best Practice Compliance.
  3. In the upper left corner of the displayed page, select a target analyzer from the drop-down list.

    Figure 3 Selecting an analyzer

  4. Click the Active, Resolved, Archived, or All tab to view the findings.

    • Active: displays findings that are not processed.
    • Resolved: displays the findings that have been resolved. The status of an active finding changes to Resolved after it is resolved.
      • Resolved findings will be deleted 90 days after the last update to the findings. Active and archived findings will not be deleted unless you delete the analyzers that generate them.
    • Archived: displays the findings that are archived. You can archive findings that do not need to be processed so that you can focus on unintended access findings.
    • All: displays all findings generated by your access analyzer.

  5. View basic information about the findings.

    Table 3 Parameters about findings

    Parameter

    Description

    Finding ID

    Unique ID assigned to the finding. You can click a finding ID to view details about the finding.

    Finding Type

    Types of best practice compliance findings, including:

    • Access keys bound to the root user
    • API access with a password
    • Login protection not enabled
    • MFA device not added
    • High-risk system-defined policies or roles attached to the user
    • High-risk system-defined identity policies attached to the user
    • High-risk system-defined policies or roles attached to the agency
    • High-risk system-defined identity policies attached to the agency

    Resource

    Type and URN of a resource analyzed by a best practice compliance analyzer.

    Updated

    Time when the finding was generated or updated.

  6. Click a finding ID to view details about the finding.