Updated on 2024-10-15 GMT+08:00

Admin Permissions Check

Rule Details

Table 1 Rule details

Parameter

Description

Rule Name

iam-policy-no-statements-with-admin-access

Identifier

iam-policy-no-statements-with-admin-access

Description

If a custom policy or role allows all actions (with the action element set to *:*:*, *:*, or *) for all cloud services, this policy or role is noncompliant.

Tag

iam

Trigger Type

Configuration change

Filter Type

iam.roles, iam.policies

Configure Rule Parameters

None

Applicable Scenario

This rule allows you to detect IAM users, user groups, and agencies that have unintended policies attached. An IAM policy with the action element set to *:*:*, *:*, or * is of high security risk.

Solution

The administrator can modify noncompliant IAM policies or roles. For more details, see Modifying or Deleting a Custom Policy.

Rule Logic

  • If a custom policy or role allows all actions (with the action element set to *:*:*, *:*, or *) for all cloud services, this policy or role is noncompliant.
  • If a custom policy or role does not allow all actions for all cloud services, this policy or role is compliant.