Control: AWS > PCI v3.2.1 > IAM > 3 IAM policies should not allow full '*' administrative privileges
This control checks whether the default version of AWS Identity and Access Management policies (also known as customer managed policies) do not have administrator access with a statement that has "Effect"
: "Allow" with "Action": "*"
over "Resource": "*"
.
It only checks for the customer managed policies that you created, but does not check for full access to individual services, such as "S3:*".
It does not check for inline and AWS managed policies.
Remediation
- Open the IAM console.
- Choose Policies.
- Choose the radio button next to the policy to remove.
- From Policy actions, choose Detach.
- On the Detach policy page, choose the radio button next to each user to detach the policy from and then choose Detach policy.
- Confirm that the user that you detached the policy from can still access AWS services and resources as expected.
PCI requirement(s): 7.2.1
Resource Types
This control targets the following resource types:
Category
In Your Workspace
Developers
- tmod:@turbot/aws-pciv3-2-1#/control/types/iamPolicyNoStar
- tmod:@turbot/turbot#/control/categories/compliancePci
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-pciv3-2-1#/control/types/iamPolicyNoStar"
Get Controls
Control Type URI
Category URI
GraphQL
CLI