Skip to content

Commit 13860df

Browse files
author
AWS
committed
Access Analyzer Update: This release adds support for the creation and management of IAM Access Analyzer analyzers with type organization. An analyzer with type organization continuously monitors all supported resources within the AWS organization and reports findings when they allow access from outside the organization.
1 parent 1031b29 commit 13860df

File tree

2 files changed

+67
-1
lines changed

2 files changed

+67
-1
lines changed
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
{
2+
"type": "feature",
3+
"category": "Access Analyzer",
4+
"description": "This release adds support for the creation and management of IAM Access Analyzer analyzers with type organization. An analyzer with type organization continuously monitors all supported resources within the AWS organization and reports findings when they allow access from outside the organization."
5+
}

services/accessanalyzer/src/main/resources/codegen-resources/service-2.json

Lines changed: 62 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,7 @@
365365
"createdAt",
366366
"isPublic",
367367
"resourceArn",
368+
"resourceOwnerAccount",
368369
"resourceType",
369370
"updatedAt"
370371
],
@@ -393,6 +394,10 @@
393394
"shape":"ResourceArn",
394395
"documentation":"<p>The ARN of the resource that was analyzed.</p>"
395396
},
397+
"resourceOwnerAccount":{
398+
"shape":"String",
399+
"documentation":"<p>The AWS account ID that owns the resource.</p>"
400+
},
396401
"resourceType":{
397402
"shape":"ResourceType",
398403
"documentation":"<p>The type of the resource that was analyzed.</p>"
@@ -416,13 +421,18 @@
416421
"type":"structure",
417422
"required":[
418423
"resourceArn",
424+
"resourceOwnerAccount",
419425
"resourceType"
420426
],
421427
"members":{
422428
"resourceArn":{
423429
"shape":"ResourceArn",
424430
"documentation":"<p>The ARN of the analyzed resource.</p>"
425431
},
432+
"resourceOwnerAccount":{
433+
"shape":"String",
434+
"documentation":"<p>The AWS account ID that owns the resource.</p>"
435+
},
426436
"resourceType":{
427437
"shape":"ResourceType",
428438
"documentation":"<p>The type of resource that was analyzed.</p>"
@@ -438,12 +448,22 @@
438448
"type":"string",
439449
"pattern":"^[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:analyzer/.{1,255}$"
440450
},
451+
"AnalyzerStatus":{
452+
"type":"string",
453+
"enum":[
454+
"ACTIVE",
455+
"CREATING",
456+
"DISABLED",
457+
"FAILED"
458+
]
459+
},
441460
"AnalyzerSummary":{
442461
"type":"structure",
443462
"required":[
444463
"arn",
445464
"createdAt",
446465
"name",
466+
"status",
447467
"type"
448468
],
449469
"members":{
@@ -467,6 +487,14 @@
467487
"shape":"Name",
468488
"documentation":"<p>The name of the analyzer.</p>"
469489
},
490+
"status":{
491+
"shape":"AnalyzerStatus",
492+
"documentation":"<p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors supported resources and generates new findings. The analyzer is <code>Disabled</code> when a user action, such as removing trusted access for IAM Access Analyzer from AWS Organizations, causes the analyzer to stop generating new findings. The status is <code>Creating</code> when the analyzer creation is in progress and <code>Failed</code> when the analyzer creation has failed. </p>"
493+
},
494+
"statusReason":{
495+
"shape":"StatusReason",
496+
"documentation":"<p>The <code>statusReason</code> provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status is displayed. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the AWS organization.</p>"
497+
},
470498
"tags":{
471499
"shape":"TagsMap",
472500
"documentation":"<p>The tags added to the analyzer.</p>"
@@ -702,6 +730,7 @@
702730
"condition",
703731
"createdAt",
704732
"id",
733+
"resourceOwnerAccount",
705734
"resourceType",
706735
"status",
707736
"updatedAt"
@@ -743,6 +772,10 @@
743772
"shape":"String",
744773
"documentation":"<p>The resource that an external principal has access to.</p>"
745774
},
775+
"resourceOwnerAccount":{
776+
"shape":"String",
777+
"documentation":"<p>The AWS account ID that owns the resource.</p>"
778+
},
746779
"resourceType":{
747780
"shape":"ResourceType",
748781
"documentation":"<p>The type of the resource reported in the finding.</p>"
@@ -785,6 +818,7 @@
785818
"condition",
786819
"createdAt",
787820
"id",
821+
"resourceOwnerAccount",
788822
"resourceType",
789823
"status",
790824
"updatedAt"
@@ -826,6 +860,10 @@
826860
"shape":"String",
827861
"documentation":"<p>The resource that the external principal has access to.</p>"
828862
},
863+
"resourceOwnerAccount":{
864+
"shape":"String",
865+
"documentation":"<p>The AWS account ID that owns the resource.</p>"
866+
},
829867
"resourceType":{
830868
"shape":"ResourceType",
831869
"documentation":"<p>The type of the resource that the external principal has access to.</p>"
@@ -1206,6 +1244,15 @@
12061244
"key":{"shape":"String"},
12071245
"value":{"shape":"String"}
12081246
},
1247+
"ReasonCode":{
1248+
"type":"string",
1249+
"enum":[
1250+
"AWS_SERVICE_ACCESS_DISABLED",
1251+
"DELEGATED_ADMINISTRATOR_DEREGISTERED",
1252+
"ORGANIZATION_DELETED",
1253+
"SERVICE_LINKED_ROLE_CREATION_FAILED"
1254+
]
1255+
},
12091256
"ResourceArn":{
12101257
"type":"string",
12111258
"pattern":"arn:[^:]*:[^:]*:[^:]*:[^:]*:.*$"
@@ -1307,6 +1354,17 @@
13071354
},
13081355
"documentation":"<p>Starts a scan of the policies applied to the specified resource.</p>"
13091356
},
1357+
"StatusReason":{
1358+
"type":"structure",
1359+
"required":["code"],
1360+
"members":{
1361+
"code":{
1362+
"shape":"ReasonCode",
1363+
"documentation":"<p>The reason code for the current status of the analyzer.</p>"
1364+
}
1365+
},
1366+
"documentation":"<p>Provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status is displayed. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the AWS organization.</p>"
1367+
},
13101368
"String":{"type":"string"},
13111369
"TagKeys":{
13121370
"type":"list",
@@ -1369,7 +1427,10 @@
13691427
"Token":{"type":"string"},
13701428
"Type":{
13711429
"type":"string",
1372-
"enum":["ACCOUNT"]
1430+
"enum":[
1431+
"ACCOUNT",
1432+
"ORGANIZATION"
1433+
]
13731434
},
13741435
"UntagResourceRequest":{
13751436
"type":"structure",

0 commit comments

Comments
 (0)