Check provider logo

Check if IAM Access Analyzer is enabled without findings

accessanalyzer_enabled_without_findings

Severitylow
by Prowler

Check if IAM Access Analyzer is enabled without findings

Risk

AWS IAM Access Analyzer helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, that are shared with an external entity. This lets you identify unintended access to your resources and data, which is a security risk. IAM Access Analyzer uses a form of mathematical analysis called automated reasoning, which applies logic and mathematical inference to determine all possible access paths allowed by a resource policy.

Run this check with Prowler CLI

prowler aws --checks accessanalyzer_enabled_without_findings

Run in Prowler Cloud

ARN template

arn:partition:access-analyzer:region:account-id:analyzer/resource-id

Remediation

CLI

aws accessanalyzer create-analyzer --analyzer-name <NAME> --type <ACCOUNT|ORGANIZATION>

WUI

Enable IAM Access Analyzer for all accounts, create analyzer and take action over it is recommendations (IAM Access Analyzer is available at no additional cost).

References:

Source Code

References

Resource Type

Other

Related URL