Skip to content

Commit fc96be3

Browse files
author
AWS
committed
Access Analyzer Update: This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators.
1 parent 2838fb8 commit fc96be3

File tree

2 files changed

+36
-4
lines changed

2 files changed

+36
-4
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Access Analyzer",
4+
"contributor": "",
5+
"description": "This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators."
6+
}

services/accessanalyzer/src/main/resources/codegen-resources/service-2.json

Lines changed: 30 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
"version":"2.0",
33
"metadata":{
44
"apiVersion":"2019-11-01",
5+
"auth":["aws.auth#sigv4"],
56
"endpointPrefix":"access-analyzer",
67
"protocol":"rest-json",
78
"protocols":["rest-json"],
@@ -660,7 +661,7 @@
660661
},
661662
"resources":{
662663
"shape":"AccessResourcesList",
663-
"documentation":"<p>A list of resources for the access permissions. Any strings that can be used as a resource in an IAM policy can be used in the list of resources to check.</p>"
664+
"documentation":"<p>A list of resources for the access permissions. Any strings that can be used as an Amazon Resource Name (ARN) in an IAM policy can be used in the list of resources to check. You can only use a wildcard in the portion of the ARN that specifies the resource ID.</p>"
664665
}
665666
},
666667
"documentation":"<p>Contains information about actions and resources that define permissions to check against a policy.</p>"
@@ -830,6 +831,10 @@
830831
"sources":{
831832
"shape":"FindingSourceList",
832833
"documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
834+
},
835+
"resourceControlPolicyRestriction":{
836+
"shape":"ResourceControlPolicyRestriction",
837+
"documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>"
833838
}
834839
},
835840
"documentation":"<p>An access preview finding generated by the access preview.</p>"
@@ -1197,11 +1202,11 @@
11971202
},
11981203
"access":{
11991204
"shape":"CheckAccessNotGrantedRequestAccessList",
1200-
"documentation":"<p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access of the actions on all resources in the policy. If only resources are specified, then IAM Access Analyzer checks which actions have access to the specified resources. If both actions and resources are specified, then IAM Access Analyzer checks which of the specified actions have access to the specified resources.</p>"
1205+
"documentation":"<p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least one of the actions on any resource in the policy. If only resources are specified, then IAM Access Analyzer checks for access to perform any action on at least one of the resources. If both actions and resources are specified, IAM Access Analyzer checks for access to perform at least one of the specified actions on at least one of the specified resources.</p>"
12011206
},
12021207
"policyType":{
12031208
"shape":"AccessCheckPolicyType",
1204-
"documentation":"<p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.</p>"
1209+
"documentation":"<p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets.</p>"
12051210
}
12061211
}
12071212
},
@@ -1749,6 +1754,10 @@
17491754
"sources":{
17501755
"shape":"FindingSourceList",
17511756
"documentation":"<p>The sources of the external access finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
1757+
},
1758+
"resourceControlPolicyRestriction":{
1759+
"shape":"ResourceControlPolicyRestriction",
1760+
"documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>"
17521761
}
17531762
},
17541763
"documentation":"<p>Contains information about an external access finding.</p>"
@@ -1826,6 +1835,10 @@
18261835
"sources":{
18271836
"shape":"FindingSourceList",
18281837
"documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
1838+
},
1839+
"resourceControlPolicyRestriction":{
1840+
"shape":"ResourceControlPolicyRestriction",
1841+
"documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>"
18291842
}
18301843
},
18311844
"documentation":"<p>Contains information about a finding.</p>"
@@ -1999,6 +2012,10 @@
19992012
"sources":{
20002013
"shape":"FindingSourceList",
20012014
"documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
2015+
},
2016+
"resourceControlPolicyRestriction":{
2017+
"shape":"ResourceControlPolicyRestriction",
2018+
"documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>"
20022019
}
20032020
},
20042021
"documentation":"<p>Contains information about a finding.</p>"
@@ -3256,7 +3273,8 @@
32563273
"enum":[
32573274
"IDENTITY_POLICY",
32583275
"RESOURCE_POLICY",
3259-
"SERVICE_CONTROL_POLICY"
3276+
"SERVICE_CONTROL_POLICY",
3277+
"RESOURCE_CONTROL_POLICY"
32603278
]
32613279
},
32623280
"Position":{
@@ -3453,6 +3471,14 @@
34533471
"type":"string",
34543472
"pattern":"arn:[^:]*:[^:]*:[^:]*:[^:]*:.*"
34553473
},
3474+
"ResourceControlPolicyRestriction":{
3475+
"type":"string",
3476+
"enum":[
3477+
"APPLICABLE",
3478+
"FAILED_TO_EVALUATE_RCP",
3479+
"NOT_APPLICABLE"
3480+
]
3481+
},
34563482
"ResourceNotFoundException":{
34573483
"type":"structure",
34583484
"required":[

0 commit comments

Comments
 (0)