You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 22, 2021. It is now read-only.
CIS 1.24 Ensure IAM policies that allow full "*:*" administrative privileges are not created
This expression should be 'Statement[?Effect == \'Allow\' && Action == \'*\' && Resource == \'*\']'. Currently it matches for example action ec2:Describe* on resource *.
https://github.com/awslabs/aws-security-benchmark/blob/097ddf7461745f684dab0ca00aa608c2047dbd80/architecture/create-benchmark-rules.yaml#L732
This expression should be
'Statement[?Effect == \'Allow\' && Action == \'*\' && Resource == \'*\']'. Currently it matches for example actionec2:Describe*on resource*.What do you think?