IAM policies with full privileges
This product is not supported for your selected
Datadog site. (
).
Id: 2f37c4a3-58b9-4afe-8a87-d7f1d2286f84
Cloud Provider: AWS
Platform: Terraform
Severity: Medium
Category: Access Control
Learn More
Description
IAM policies should never allow full administrative privileges across all resources, which occurs when both "Action" and "Resource" are set to "*", as shown below:
"Statement": [
{
"Effect": "Allow",
"Action": ["*"],
"Resource": "*"
}
]
Granting such broad permissions bypasses the principle of least privilege, enabling any user or service with this policy to perform any action on any AWS resource. If left unaddressed, this misconfiguration can lead to privilege escalation, data exfiltration, resource manipulation, or complete account compromise in the event of credential leakage.
Compliant Code Examples
resource "aws_iam_role_policy" "negative1" {
name = "apigateway-cloudwatch-logging"
role = aws_iam_role.apigateway_cloudwatch_logging.id
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["some:action"],
"Resource": "*"
}
]
}
EOF
}
data "aws_iam_policy_document" "example" {
statement {
sid = "1"
effect = "Allow"
actions = [
"*"
]
resources = [
"arn:aws:s3:::*",
]
}
}
Non-Compliant Code Examples
resource "aws_iam_role_policy" "positive1" {
name = "apigateway-cloudwatch-logging"
role = aws_iam_role.apigateway_cloudwatch_logging.id
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["*"],
"Resource": "*"
}
]
}
EOF
}
data "aws_iam_policy_document" "example" {
statement {
sid = "1"
effect = "Allow"
actions = [
"*"
]
resources = [
"*",
]
}
}