Control: AWS > HIPAA > IAM > IAM policy should not have statements with admin access
AWS Identity and Access Management (IAM) can help you incorporate the principles of least privilege and separation of duties with access permissions and authorizations, restricting policies from containing 'Effect': 'Allow' with 'Action': '*'
over 'Resource': '*'
.
Resource Types
This control targets the following resource types:
Category
In Your Workspace
Developers
- tmod:@turbot/aws-hipaa#/control/types/iamPolicyNoStar
- tmod:@turbot/turbot#/control/categories/complianceHipaa
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-hipaa#/control/types/iamPolicyNoStar"
Get Controls
Control Type URI
Category URI
GraphQL
CLI