Ensure AWS IAM policy does not allow assume role permission across all services
ID |
iam_policy_allows_assume_from_account |
Severity |
critical |
Vendor |
AWS |
Resource |
IAM |
Tags |
reachable |
Description
The Action element describes the specific action or actions that will be allowed or denied. Statements must include either an Action or NotAction element.
When a user assumes a role, it provides temporary security credentials for a bounded session. So assuming a root role probably is a misconfiguration, since standard security practice is to grant least privilege.
A refined policy assuming only the specific roles required by the specific policy holder should be used instead.