From 4932cccdce3c15abfb93845e47ab82fa5c78d106 Mon Sep 17 00:00:00 2001 From: Gabriel Soltz <8935378+gabrielsoltz@users.noreply.github.com> Date: Mon, 25 Mar 2024 09:41:21 +0100 Subject: [PATCH] fix(metadata): change ResourceType Type for AWS Inline Policy Check (#3599) --- ...iam_inline_policy_no_administrative_privileges.metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/prowler/providers/aws/services/iam/iam_inline_policy_no_administrative_privileges/iam_inline_policy_no_administrative_privileges.metadata.json b/prowler/providers/aws/services/iam/iam_inline_policy_no_administrative_privileges/iam_inline_policy_no_administrative_privileges.metadata.json index 87ffe51c01..a9abc21164 100644 --- a/prowler/providers/aws/services/iam/iam_inline_policy_no_administrative_privileges/iam_inline_policy_no_administrative_privileges.metadata.json +++ b/prowler/providers/aws/services/iam/iam_inline_policy_no_administrative_privileges/iam_inline_policy_no_administrative_privileges.metadata.json @@ -11,7 +11,7 @@ "SubServiceName": "", "ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id", "Severity": "high", - "ResourceType": "AwsIamPolicy", + "ResourceType": "AwsIamRole", "Description": "Ensure inline policies that allow full \"*:*\" administrative privileges are not associated to IAM identities", "Risk": "IAM policies are the means by which privileges are granted to users, groups or roles. It is recommended and considered a standard security advice to grant least privilege—that is; granting only the permissions required to perform a task. Determine what users need to do and then craft policies for them that let the users perform only those tasks instead of allowing full administrative privileges. Providing full administrative privileges instead of restricting to the minimum set of permissions that the user is required to do exposes the resources to potentially unwanted actions.", "RelatedUrl": "",