Description:

This policy enables a system report that lists all user accounts, their associated groups, and the groups' role permissions. This report can be used to track user activity, identify potential security risks, and audit compliance with security policies.

Rationale:

The ability to track user activity and identify potential security risks is essential for maintaining the security of an AWS environment. This policy provides a valuable tool for doing so by providing a comprehensive report of user accounts, their associated groups, and the groups' role permissions.

Impact:

Enabling this policy will have no impact on the availability or performance of AWS resources. However, it will increase the amount of data that is stored in AWS.

Default Value:

AWS will not enable this policy by default.

Pre-requisites:

  • The user must have the appropriate permissions to enable this policy.
  • The user must have access to the AWS Management Console or the AWS CLI.

Remediation Steps:

To disable this policy, the user can follow these steps:

  1. In the AWS Management Console, navigate to the IAM & Admin page.
  2. Click on the Policies tab.
  3. Select the policy that you want to disable.
  4. Click on the Disable button.

Test Plan:

To test this policy, the user can follow these steps:

  1. Enable the policy.
  2. Generate the system report.
  3. Verify that the report includes all user accounts, their associated groups, and the groups' role permissions.

Implementation Plan:

To implement this policy, the user can follow these steps:

  1. Enable the policy.
  2. Generate the system report.
  3. Review the report to ensure that it is accurate and complete.

AWS CLI Process:

To enable this policy using the AWS CLI, the user can run the following command:

aws iam update-policy --policy-name <policy-name> --policy-document file://<policy-document-file>

The policy-document-file file should contain the following JSON:

{  "Version": "2012-10-17",  "Statement": [    {      "Effect": "Allow",      "Action": "iam:GenerateReport",      "Resource": "*"    }  ] }

Using AWS GUI:

To enable this policy using the AWS GUI, the user can follow these steps:

  1. In the AWS Management Console, navigate to the IAM & Admin page.
  2. Click on the Policies tab.
  3. Select the policy that you want to enable.
  4. Click on the Edit button.
  5. In the Policy Document section, paste the following JSON:
{  "Version": "2012-10-17",  "Statement": [    {      "Effect": "Allow",      "Action": "iam:GenerateReport",      "Resource": "*"    }  ] }
  1. Click on the Save button.

Backout Plan:

To revoke this policy, the user can follow these steps:

  1. In the AWS Management Console, navigate to the IAM & Admin page.
  2. Click on the Policies tab.
  3. Select the policy that you want to revoke.
  4. Click on the Delete button.

Note:

  • This policy is not required for all AWS environments.
  • The user should review the system report to ensure that it is accurate and complete.
  • The user should revoke this policy if it is no longer needed.

Reference:

  • AWS IAM Policy Reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html
  • AWS CLI Command Reference: https://docs.aws.amazon.com/cli/latest/reference/iam/

Section 2:

  • Tags: user, group, permission, report
  • Keywords: IAM, policy, audit, compliance