Resource Access Authorization

Information

After a user or IAM role has been authenticated, they can access resources to which they are authorized.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

You provide resource authorization using resource policies or capability policies, depending on whether you want the user to have control over the resources, or whether you want to override individual user control.

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-1, 800-53|AC-2, 800-53|AC-5, 800-53|AC-6, 800-53|AU-1, 800-53|AU-6, 800-53|IA-1, 800-53|SI-1, 800-53|SI-4

Plugin: amazon_aws

Control ID: d8ebba27f32f0868e22e0f593ea1a0572db787fee493b3c2926b44dfd6cec6a1