AWS IAM policy with administrative privileges is not attached to any principal


A privileged IAM policy exists but is not attached to any principal.


If an IAM policy is not in use it may indicate that it is no longer needed. Highly privileged policies may accidentally be attached to principals, providing them full access to all services and resources in the AWS account. Unused policies should be removed to mitigate this risk.


Determine if the policy is needed for a particular function and if not, remove it.