Ensure IAM Roles do not have AdministratorAccess policy attached
Risk
The AWS-managed AdministratorAccess policy grants all actions for all AWS services and for all resources in the account and as such exposes the customer to a significant data leakage threat. It should be granted very conservatively. For granting access to 3rd party vendors, consider using alternative managed policies, such as ViewOnlyAccess or SecurityAudit.
prowler aws --checks iam_role_administratoraccess_policy
arn:partition:service:region:account-id:resource-id
Recommendation
Apply the principle of least privilege. Instead of AdministratorAccess, assign only the permissions necessary for specific roles and tasks. Create custom IAM policies with minimal permissions based on the principle of least privilege.
Remediation
CAF Security Epic: IAM
Source Code
Resource Type
AwsIamRole