The following table shows a list of AWS-managed IAM Policies that are currently used in the account.
If the policy contains IAM Actions - or combinations of actions - that fall under certain risk categories - Infrastructure Modification, Privilege Escalation, Resource Exposure, or Data Exfiltration - then the number of occurrences per-policy and per-risk is included in the table.
Each of the aforementioned attributes can be used to prioritize which risks to address first. For more information, see the Prioritization Guidance and Triaging Considerations. Consider using all of the Guidance criteria when reviewing this report as well.
Note that policies or IAM Principals excluded from the scan will not show up in the table at all. Please refer to the Exclusions configuration to see which ones were excluded. To view the list of IAM Principals and their associated policies, see the IAM Principals Tab.
Policy Name | Services Count | Services Affected | Infrastructure Modification | Privilege Escalation | Resource Exposure | Data Exfiltration |
---|---|---|---|---|---|---|
{{ finding['PolicyName'] }} | {{ finding["ServicesCount"] }} | {% for service in finding["Services"] %}{{ service }}{% if not loop.last %}, {% endif %}{% endfor %} | {{ finding["ActionsCount"] }} | {% if finding["PrivilegeEscalation"]|length > 0 %} {{ finding["PrivilegeEscalation"]|length }} {% endif %} | {% if finding["PermissionsManagementActions"]|length>0 %} {{ finding["PermissionsManagementActions"]|length }}{% endif %} | {% if finding["DataExfiltrationActions"]|length > 0 %}{{ finding["DataExfiltrationActions"]|length }} {% endif %} |