Open rdegraaf-ncc3 opened 5 months ago
@rdegraaf-ncc3 do you view this as a blocker to finishing our v1.0 cloud standard? Or can this be considered a backlog item for discussion in the next round of updates?
I wouldn't say that it's a blocker, just that it makes the rule kind of useless.
Cloud Profile rule 2.7.3 "Ensure IAM policies that allow full "*:*" administrative privileges are not attached" has the following exception:
That exception was drawn from https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-1, which states
When we debated this rule a few months ago, I argued that use of the built-in AWS-managed permission policy "AdministratorAccess" should be permitted because nearly all accounts need some sort of administrator, even if only rarely. Without this exception, account operators will be required to do one of the following:
Allowing admin access to be granted only through the AWS-managed "AdministratorAccess" permission policy makes it very clear when a principal is intended to be an admin, which I feel is a good thing.
However, as written, we also allow admin permissions to be granted through inline permission policies. That largely neuters this rule since now operators can grant admin permissions however and wherever they want again. I think that AWS SecurityHub included this exception because their check works only at the level of Managed permission policies: inline permissions policies are different so their tool doesn't check them. I believe that they're documenting a limitation of their tool rather than something that they feel that account operators should do.
I propose removing "inline and" from the exception. Then we need steps to inspect inline permission policies for Users, Roles, and Groups: