Check failing due to IAM Roles created by AWS Control Tower and AFT with AdministratorAccess policy #3810
Labels
bug
provider/aws
Issues/PRs related with the AWS provider
severity/medium
Results in some unexpected or undesired behavior.
Discussed in #3809
Originally posted by @dmkim22-lguplus April 18, 2024
Hello,
IAM Roles created by AWS Control Tower and AFT (Account Factory for Terraform) have AdministratorAccess policy attached, and it seems "Ensure IAM AWS-Managed policies that allow full ":" administrative privileges are not attached" is failing due to this.
Should the following IAM Roles in an account be excluded from this check?
Thank you in advance.
The text was updated successfully, but these errors were encountered: