All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.accessanalyzer.package-info Maven / Gradle / Ivy

/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */

/**
 * 

* Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a * suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks * for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer * to identify external or unused access, you first need to create an analyzer. *

*

* External access analyzers help identify potential risks of accessing resources by enabling you to identify any * resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze * resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web * Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous * user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before * deploying permissions changes. *

*

* Unused access analyzers help identify potential identity access risks by enabling you to identify unused IAM * roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level * permissions. *

*

* Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before * deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated * using access activity logged in CloudTrail logs. *

*

* This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information * about IAM Access Analyzer, see Identity and Access Management * Access Analyzer in the IAM User Guide. *

*/ package com.amazonaws.services.accessanalyzer;




© 2015 - 2025 Weber Informatics LLC | Privacy Policy