Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
AWS
Loading resources...

Resource Type: AWS > IAM > Policy

The IAM Policy resource type is part of the AWS Identity and Access Management (IAM) service. Each IAM Policy resource defines permissions that can be attached to users, groups, or roles to control access to AWS resources.

Resource Context

Policy is a part of the IAM service.

Each Policy lives under an Account.

Controls

The primary controls for AWS > IAM > Policy are:

  • Active
  • Approved
  • CMDB
  • Configured
  • Discovery
  • Intelligent Assessment
  • Statements

It is also targeted by these controls:

  • AWS > CIS v1 > 1 Identity and Access Management > 1.22 Ensure IAM policies that allow full "*:*" administrative privileges are not created (Scored)
  • AWS > CIS v1.4 > 1 - Identity and Access Management > 1.16 - Ensure IAM policies that allow full "*:*" administrative privileges are not attached (Automated)
  • AWS > CIS v2.0 > 1 - Identity and Access Management > 1.16 - Ensure IAM policies that allow full "*:*" administrative privileges are not attached
  • AWS > CIS v3.0 > 1 - Identity and Access Management > 1.16 - Ensure IAM policies that allow full "*:*" administrative privileges are not attached
  • AWS > CIS v4.0 > 1 - Identity and Access Management > 1.16 - Ensure IAM policies that allow full "*:*" administrative privileges are not attached
  • AWS > CIS v5.0 > 1 - Identity and Access Management > 1.15 - Ensure IAM policies that allow full "*:*" administrative privileges are not attached
  • AWS > CIS v6.0 > 2 - Identity and Access Management > 2.15 - Ensure IAM policies that allow full "*:*" administrative privileges are not attached
  • AWS > HIPAA > IAM > IAM policy should not have statements with admin access
  • AWS > HIPAA > IAM > KMS key decryption should be restricted in IAM customer managed policy
  • AWS > NIST 800-53 > IAM > Ensure IAM policy should not grant full access to service
  • AWS > NIST 800-53 > IAM > IAM policy should not have statements with admin access
  • AWS > PCI v3.2.1 > IAM > 3 IAM policies should not allow full '*' administrative privileges
  • AWS > Turbot > IAM > Policy > Managed

Quick Actions

  • Create Version
  • Delete
  • Delete from AWS
  • Detach and delete
  • Router
  • Skip alarm for Active control
  • Skip alarm for Active control [90 days]
  • Skip alarm for Approved control
  • Skip alarm for Approved control [90 days]

Category

  • IAM

In Your Workspace

  • Controls by Resource Type report
  • Policy Settings by Resource Type report
  • Resources by Resource Type report

Developers

    Resource Type URI
    • tmod:@turbot/aws-iam#/resource/types/iamPolicy
  • Category URI
    • tmod:@turbot/turbot#/resource/categories/iam
  • GraphQL
    • query resource(id: "tmod:@turbot/aws-iam#/resource/types/iamPolicy") { … }
    • query resourceActivities(filter: "resourceId:'tmod:@turbot/aws-iam#/resource/types/iamPolicy'") { … }
    • mutation createResource(input: { … })
    • mutation updateResource(input: { … })
  • CLI
    • Get Resource
    • turbot graphql resource --id "tmod:@turbot/aws-iam#/resource/types/iamPolicy"
  • Steampipe Query
    • Get Resource
    • select * from guardrails_resource where resource_type_uri = 'tmod:@turbot/aws-iam#/resource/types/iamPolicy';
    • Get Policy Settings (By Resource ID)
    • select * from guardrails_policy_setting where filter = 'resourceTypeId:"tmod:@turbot/aws-iam#/resource/types/iamPolicy"';
    • Get Resource Notification
    • select * from guardrails_notification where resource_type_uri = 'tmod:@turbot/aws-iam#/resource/types/iamPolicy' and notification_type in ('resource_updated', 'resource_created');
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
180
Mods
497
Resource Types
8,691
Policies
3,362
Controls
1,833
Quick Actions
540
IAM