Check provider logo

Ensure IAM Roles do not have AdministratorAccess policy attached

iam_role_administratoraccess_policy

Severityhigh
Serviceiam
by Prowler

Ensure IAM Roles do not have AdministratorAccess policy attached

Risk

The AWS-managed AdministratorAccess policy grants all actions for all AWS services and for all resources in the account and as such exposes the customer to a significant data leakage threat. It should be granted very conservatively. For granting access to 3rd party vendors, consider using alternative managed policies, such as ViewOnlyAccess or SecurityAudit.

Run this check with Prowler CLI

prowler aws --checks iam_role_administratoraccess_policy

ARN template
arn:partition:service:region:account-id:resource-id

Recommendation

Apply the principle of least privilege. Instead of AdministratorAccess, assign only the permissions necessary for specific roles and tasks. Create custom IAM policies with minimal permissions based on the principle of least privilege.

Remediation

Other

CAF Security Epic: IAM

Source Code

Resource Type

AwsIamRole

References