Check provider logo

IAM group does not have AdministratorAccess policy attached

iam_group_administrator_access_policy

Severityhigh
Serviceiam
by Prowler

IAM groups are assessed for the AWS-managed AdministratorAccess policy attachment.

The finding reports any group that has this policy among its attached permissions.

Risk

Group-wide AdministratorAccess gives all members unrestricted control. A stolen or misused account can:

  • Read/exfiltrate sensitive data (C)
  • Modify or delete resources and configs (I/A)
  • Disable logging and weaken defenses, enabling persistence and lateral movement
Run this check with Prowler CLI

prowler aws --checks iam_group_administrator_access_policy

Recommendation

Remove AdministratorAccess from groups. Apply least privilege with task-scoped, customer-managed policies and separation of duties. Use roles for admin tasks with MFA, time-bound elevation, and auditing. Regularly review group membership and permissions; prefer defense-in-depth guardrails.

Remediation

CLI

aws iam detach-group-policy --group-name <groupname> --policy-arn arn:aws:iam::aws:policy/AdministratorAccess

Native IaC
Terraform
Other
  1. In the AWS Console, go to IAM > User groups
  2. Select the target group (<groupname>)
  3. Open the Permissions tab > Attached policies
  4. Select the policy AdministratorAccess and click Detach
  5. Confirm to remove the policy

Source Code

Resource Type

AwsIamGroup

References