AWS IAM policy with administrative privileges is not attached to any principal

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

A privileged IAM policy exists but is not attached to any principal.

Rationale

If an IAM policy is not in use it may indicate that it is no longer needed. Highly privileged policies may accidentally be attached to principals, providing them full access to all services and resources in the AWS account. Unused policies should be removed to mitigate this risk.

Remediation

Determine if the policy is needed for a particular function and if not, remove it.

PREVIEWING: rtrieu/product-analytics-ui-changes