AWS IAM policy with administrative privileges is not attached to any principal

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Description

A privileged IAM policy exists but is not attached to any principal.

Rationale

If an IAM policy is not in use it may indicate that it is no longer needed. Highly privileged policies may accidentally be attached to principals, providing them full access to all services and resources in the AWS account. Unused policies should be removed to mitigate this risk.

Remediation

Determine if the policy is needed for a particular function and if not, remove it.

PREVIEWING: rtrieu/product-analytics-ui-changes