Validate AWS Policies Report

Access Analyzer Report for Permissions Set

filePolicysummary
policy_allow_all_access_devs_special_users_2.json
policyNameissueCodefindingTypedetails
policy_allow_all_access_devs_special_users_2CREATE_SLR_WITH_STAR_IN_ACTION_AND_RESOURCEWARNING
findingDetailsUsing wildcards (*) in the action and the resource can allow creation of unintended service-linked roles because it allows iam:CreateServiceLinkedRole permissions on all resources. We recommend that you specify resource ARNs instead.
findingTypeWARNING
issueCodeCREATE_SLR_WITH_STAR_IN_ACTION_AND_RESOURCE
learnMoreLinkhttps://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-policy-checks.html#access-analyzer-reference-policy-checks-general-warning-create-slr-with-star-in-action-and-resource
locations
pathspan
  • valueStatement
  • index1
  • valueAction
  • index0
start
line67
column8
offset1529
end
line67
column11
offset1532
  • valueStatement
  • index1
  • valueResource
start
line69
column18
offset1560
end
line71
column7
offset1580
policy_allow_all_access_devs_special_users_2PASS_ROLE_WITH_STAR_IN_ACTION_AND_RESOURCESECURITY_WARNING
findingDetailsUsing wildcards (*) in the action and the resource can be overly permissive because it allows iam:PassRole permissions on all resources. We recommend that you specify resource ARNs or add the iam:PassedToService condition key to your statement.
findingTypeSECURITY_WARNING
issueCodePASS_ROLE_WITH_STAR_IN_ACTION_AND_RESOURCE
learnMoreLinkhttps://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-policy-checks.html#access-analyzer-reference-policy-checks-security-warning-pass-role-with-star-in-action-and-resource
locations
pathspan
  • valueStatement
  • index1
  • valueAction
  • index0
start
line67
column8
offset1529
end
line67
column11
offset1532
  • valueStatement
  • index1
  • valueResource
  • index0
start
line70
column7
offset1569
end
line70
column10
offset1572
policy_allow_all_access_devs_special_users.json
policyNameissueCodefindingTypedetails
policy_allow_all_access_devs_special_usersNoneNoneNo findings