Check provider logo

Ensure IAM Customer-Managed policies that allow full "*:*" administrative privileges are not attached

iam_customer_attached_policy_no_administrative_privileges

Severityhigh
Serviceiam
by Prowler

Ensure IAM Customer-Managed policies that allow full ":" administrative privileges are not attached

Risk

IAM policies are the means by which privileges are granted to users, groups, or roles. It is recommended and considered a standard security advice to grant least privilege—that is, granting only the permissions required to perform a task. Determine what users need to do and then craft policies for them that let the users perform only those tasks instead of allowing full administrative privileges. Providing full administrative privileges instead of restricting to the minimum set of permissions that the user is required to do exposes the resources to potentially unwanted actions.

Run this check with Prowler CLI

prowler aws --checks iam_customer_attached_policy_no_administrative_privileges

ARN template
arn:partition:service:region:account-id:resource-id

Recommendation

It is more secure to start with a minimum set of permissions and grant additional permissions as necessary, rather than starting with permissions that are too lenient and then trying to tighten them later. List policies an analyze if permissions are the least possible to conduct business activities.

Remediation

Source Code

Resource Type

AwsIamPolicy