AWS Lambda function has administrative privileges

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Description

This rule ensures that none of your Lambda functions have IAM roles with highly-privileged policies or administrative policies attached to them.

Rationale

An IAM role with highly privileged or administrative permissions can access all AWS services and resources in the account. A role with these privileges could potentially, whether unknowingly or purposefully, cause security issues or data leaks. Roles with these levels of access may also be targeted by an adversary to compromise the entire AWS account.

Remediation

Datadog recommends reducing the permissions attached to a Lambda Function to the minimum necessary for it to fulfill its function. You can use AWS Access Advisor to identify effective permissions used by your instances, and use AWS IAM Access Analyzer to generate an IAM policy based on past CloudTrail events.

PREVIEWING: rtrieu/product-analytics-ui-changes