Check failing due to IAM Roles created by AWS Control Tower and AFT with AdministratorAccess policy #3809
-
Hello, IAM Roles created by AWS Control Tower and AFT (Account Factory for Terraform) have AdministratorAccess policy attached, and it seems "Ensure IAM AWS-Managed policies that allow full ":" administrative privileges are not attached" is failing due to this. Should the following IAM Roles in an account be excluded from this check?
Thank you in advance. |
Beta Was this translation helpful? Give feedback.
Answered by
jfagoagas
Apr 18, 2024
Replies: 1 comment
-
@dmkim22-lguplus I'm moving this to an issue #3810 Thanks for using Prowler 🚀 |
Beta Was this translation helpful? Give feedback.
0 replies
Answer selected by
dmkim22-lguplus
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
@dmkim22-lguplus I'm moving this to an issue #3810
Thanks for using Prowler 🚀