๐ก๏ธ AWS IAM Policy (Customer Managed) Contains Potential Credentials Exposure๐ด๐
- Contextual name: ๐ก๏ธ Policy (Customer Managed) Contains Potential Credentials Exposure๐ด๐
- ID:
/ce/ca/aws/iam/policy-customer-managed-potential-credentials-exposure - Tags:
Logicโ
- ๐ง wip.logic.yaml๐ด๐
- ๐ AWS IAM Policy
Internal Notes ๐ โ
Policy descriptionโ
Origin of the policyโ
The policy is based on CA policy
ce:ca:aws:iam:policy-customer-managed-potential-credentials-exposure
![]()
The policy originates from a customer request and developed to their specifications.
Does this policy make sense?โ
This policy basically looks for specific Actions in the policy statements. No other logic is applied.
Because the
inputTypeisAWS IAM Policy, the policy document isIdentity-basedand would not have anyPrincipal.We can not apply any specific
ACCESS_LEVELto filter out the statements, they all are going to be detected asEXTERNAL_PRINCIPAL, but actually you can only attach this policy to the objects in your account, so effectively it's likeSAME_ACCOUNT.The only way of fixing the violation is to delete the actions from the policy. But there would be use-cases where you have to have these actions to make things work.
[!WARNING] So it's not completely clear if this policy is meaningless or we can modify it to make it somehow useful.
... see more
