AWS IAM policy with administrative privileges is not attached to any principal

Description

A privileged IAM policy exists but is not attached to any principal.

Rationale

If an IAM policy is not in use it may indicate that it is no longer needed. Highly privileged policies may accidentally be attached to principals, providing them full access to all services and resources in the AWS account. Unused policies should be removed to mitigate this risk.

Remediation

Determine if the policy is needed for a particular function and if not, remove it.

PREVIEWING: may/unit-testing