Policy: AWS > IAM > Role > Policy > Trusted Access
Take an action when AWS IAM role policy is not trusted based on the AWS > IAM > Role > Policy > Trusted Access > *
policies.
The Trusted Access control evaluates the role policy against the list of allowed members in each of the Trusted Access sub-policies (Trusted Access > Accounts, Trusted Access > Services etc.), this control raises an alarm and takes the defined enforcement action.
The account that owns the role will always be trusted, even if its account ID is not included in the Trusted Accounts policy.
If set to Enforce: Revoke untrusted access
, access to non-trusted members will be removed.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
Controls
Policy Packs
This policy setting is used by the following policy packs:
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/securityTrustedAccess
- tmod:@turbot/aws-iam#/policy/types/rolePolicyTrustedAccess
- turbot graphql policy-type --id "tmod:@turbot/aws-iam#/policy/types/rolePolicyTrustedAccess"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-iam#/policy/types/rolePolicyTrustedAccess"
Get Policy TypeGet Policy Settings