Check provider logo

IAM role does not have AdministratorAccess policy attached

iam_role_administratoraccess_policy

Severityhigh
Serviceiam
by Prowler

IAM roles (excluding service roles) are evaluated for attachment of the AWS-managed AdministratorAccess policy.

Attachment indicates the role holds unrestricted permissions across services and resources.

Risk

Granting full administrative permissions on a role undermines confidentiality, integrity, and availability. If the role is assumed or its credentials are stolen, an attacker can read sensitive data, change policies, disable auditing, delete resources and backups, and create new privileged identities, enabling swift account takeover.

Run this check with Prowler CLI

prowler aws --checks iam_role_administratoraccess_policy

Recommendation

Apply least privilege: avoid attaching AdministratorAccess to roles. Grant only task-scoped permissions with custom policies and enforce separation of duties.

Use permissions boundaries, SCPs, and policy conditions to constrain power. Require MFA for break-glass admins, time-bound elevation with approval, and refine access using Access Analyzer.

Remediation

CLI

aws iam detach-role-policy --role-name <ROLE_NAME> --policy-arn arn:aws:iam::aws:policy/AdministratorAccess

Native IaC
Terraform
Other
  1. In the AWS Console, go to IAM > Roles
  2. Select the role flagged by the check
  3. On the Permissions tab, under Attached policies, find "AdministratorAccess"
  4. Click Detach next to "AdministratorAccess"
  5. Confirm the detach

Source Code

Resource Type

AwsIamRole

References