External
Internal
Unused
resourceTypeAWS::S3::Bucket
| AWS::IAM::Role
| AWS::SQS::Queue
| AWS::Lambda::Function
| AWS::Lambda::LayerVersion
|AWS::KMS::Key
| AWS::SecretsManager::Secret
| AWS::EFS::FileSystem
| AWS::EC2::Snapshot
| AWS::ECR::Repository
| AWS::RDS::DBSnapshot
| AWS::RDS::DBClusterSnapshot
| AWS::SNS::Topic
| AWS::S3Express::DirectoryBucket
| AWS::DynamoDB::Table
| AWS::DynamoDB::Stream
| AWS::IAM::User
The type of resource that the external principal has access to.
String Yes Yes YesExternal
Internal
Unused
resourceOwnerAccount Resource Owner Account The 12 digit AWS account ID that owns the resource. To learn more, see AWS account identifiers. String Yes Yes YesExternal
Internal
Unused
isPublic Public access Indicates whether the finding reports a resource that has a policy that allows public access. Boolean Yes Yes YesExternal
findingTypeExternalAccess
| UnusedIAMRole
| UnusedIAMUserAccessKey
| UnusedIAMUserPassword
| UnusedPermission
| InternalAccess
ExternalAccess
. For unused access analyzers, the type can be UnusedIAMRole
, UnusedIAMUserAccessKey
, UnusedIAMUserPassword
, or UnusedPermission
. For internal access analyzers, the type is InternalAccess
. String Yes Yes Yes
External
Internal
Unused
resourceControlPolicyRestrictionAPPLIED
| APPLICABLE
| FAILED_TO_EVALUATE_RCP
| NOT_APPLICABLE
External
Internal
serviceControlPolicyRestrictionAPPLIED
| APPLICABLE
| FAILED_TO_EVALUATE_SCP
| NOT_APPLICABLE
Internal
statusACTIVE
| ARCHIVED
| RESOLVED
External
Internal
Unused
error Error Indicates the error reported for the finding. String Yes Yes YesExternal
Internal
principal.AWS AWS Account The account granted access to the resource in thePrincipal
field of the finding. Enter the 12-digit AWS account ID or the ARN of the external AWS user or role. To learn more, see AWS account identifiers. String Yes Yes Yes
External
principal.Federated Federated User The ARN of the federated identity that has access to the resource in the finding. To learn more, see Identity providers and federation String Yes Yes YesExternal
condition.aws:PrincipalArn Principal ARN The ARN of the principal (IAM user, role, or group) indicated as the condition for resource access. To learn more, see AWS global condition context keys. String Yes Yes YesExternal
condition.aws:PrincipalOrgID Principal OrgID The organization identifier of the principal indicated as the condition for resource access. To learn more, see AWS global condition context keys. String Yes Yes YesExternal
condition.aws:PrincipalOrgPaths Principal OrgPaths The organization or organizational unit (OU) ID indicated as the condition for resource access. To learn more, see AWS global condition context keys. String Yes Yes YesExternal
condition.aws:SourceIp Source IP The IP address that allows the principal access to the resource when using the specified IP address. To learn more, see AWS global condition context keys. IP address Yes Yes YesExternal
condition.aws:SourceVpc Source VPC The VPC ID that allows the principal access to the resource when using the specified VPC. To learn more, see AWS global condition context keys. String Yes Yes YesExternal
condition.aws:UserId User ID The user ID of the IAM user from an external account indicated as the condition for access to the resource. To learn more, see AWS global condition context keys. String Yes Yes YesExternal
condition.cognito-identity.amazonaws.com:aud Cognito Audience The Amazon Cognito identity pool ID specified as a condition for IAM role access in the finding. To learn more, see IAM and AWS STS condition context keys. String Yes Yes YesExternal
condition.graph.facebook.com:app_id Facebook App ID The Facebook application ID (or site ID) specified as a condition to allow Login with Facebook federation access to the IAM role in the finding. To learn more, see IAM and AWS STS condition context keys. String Yes Yes YesExternal
condition.accounts.google.com:aud Google Audience The Google application ID specified as a condition for access to the IAM role. To learn more, see IAM and AWS STS condition context keys. String Yes Yes YesExternal
condition.kms:CallerAccount KMS Key ID The AWS account ID that owns the calling entity (IAM user, role or account root user) used by services calling AWS KMS. To learn more, see Condition keys for AWS Key Management Service. String Yes Yes YesExternal
condition.www.amazon.com:app_id Amazon App ID The Amazon application ID (or site ID) specified as a condition to allow Login with Amazon federation access to the role. To learn more, see String Yes Yes YesExternal
id Finding ID The ID of the finding. String No Yes YesExternal
Internal
Unused
changeTypeCHANGED
| NEW
| UNCHANGED
External
existingFindingId The existing ID of the finding in IAM Access Analyzer, provided only for existing findings in the access preview. String No No YesExternal
existingFindingStatus The existing status of the finding, provided only for existing findings in the access preview. String No No YesExternal
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4