Check provider logo

Attached AWS-managed IAM policy does not allow '*:*' administrative privileges

iam_aws_attached_policy_no_administrative_privileges

Severitycritical
Serviceiam
by Prowler

IAM AWS-managed policies attached to identities are inspected for statements that allow Action:'*' on Resource:'*'-i.e., full administrative *:* permissions

Risk

Unrestricted *:* access enables any action on any resource, risking:

  • Data exfiltration (confidentiality)
  • Unauthorized changes and policy tampering (integrity)
  • Service deletion or shutdown (availability) Attackers can disable logging, create backdoor principals, and expand lateral movement.
Run this check with Prowler CLI

prowler aws --checks iam_aws_attached_policy_no_administrative_privileges

Recommendation

Apply least privilege: avoid attaching AWS-managed policies that grant *:*.

  • Use customer-managed, scoped policies per role
  • Enforce separation of duties and permissions boundaries
  • Prefer temporary, time-bound elevation for emergencies with MFA
  • Regularly review access and use conditions to constrain context

Remediation

Native IaC
Terraform
Other
  1. In the AWS Console, go to IAM > Policies
  2. Search for the flagged AWS-managed policy (e.g., AdministratorAccess) and open it
  3. Click Attached entities
  4. Select all Users, Groups, and Roles shown and click Detach
  5. Confirm the policy shows 0 attached entities
  6. Rerun the check to verify it passes

Source Code

Resource Type

AwsIamPolicy

References