Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Controls
CIS-AWS-Foundations
CSA-CCM
- Snyk ID SNYK-CC-TF-118
- credit Snyk Research Team
Description
Any principal in the account will be able to use the permissions granted by the attached policies. If a Condition
is used this would be considered a medium severity.
How to fix?
Set Principal
attribute to specific principal, e.g. arn:aws:iam::1234:role/role-name