Skip to main content

πŸ“ AWS IAM Policy (Customer Managed) Contains Potential Credentials Exposure πŸ”΄πŸŸ 

  • Contextual name: πŸ“ Policy (Customer Managed) Contains Potential Credentials Exposure πŸ”΄πŸŸ 
  • ID: /ce/ca/aws/iam/policy-customer-managed-potential-credentials-exposure
  • Located in: πŸ“ AWS IAM

Flags​

Logic​

Internal Notes πŸŸ β€‹

Open File

Policy description​

Origin of the policy​

The policy is based on CA policy ce:ca:aws:iam:policy-customer-managed-potential-credentials-exposure

Policy part 1 Policy part 2

The policy originates from a customer request and developed to their specifications.

Does this policy make sense?​

This policy basically looks for specific Actions in the policy statements. No other logic is applied.

Because the inputType is AWS IAM Policy, the policy document is Identity-based and would not have any Principal.

We can not apply any specific ACCESS_LEVEL to filter out the statements, they all are going to be detected as EXTERNAL_PRINCIPAL, but actually you can only attach this policy to the objects in your account, so effectively it's like SAME_ACCOUNT.

The only way of fixing the violation is to delete the actions from the policy. But there would be use-cases where you have to have these actions to make things work.

[!WARNING] So it's not completely clear if this policy is meaningless or we can modify it to make it somehow useful.

... see more

policy.yaml​

Open File