Checks whether a policy is directly attached to a RAM user.
Scenario
A RAM user should inherit permissions from a RAM user group or a RAM role rather than being directly granted the permissions. This allows you to change the permissions of a RAM user by changing the permissions of the RAM user group to which the RAM user belongs or the RAM role of the RAM user. This way, when a resignation occurs in your organization, you can better arrange permission handover and manage the permissions in a systematic way.
Risk level
Default risk level: low.
You can change the risk level as required when you apply this rule.
Compliance evaluation logic
- If a policy is not directly attached to a RAM user, the evaluation result is compliant.
- If a policy is directly attached to a RAM user, the evaluation result is non-compliant. For more information about how to correct the non-compliant configuration, see Non-compliance remediation.
Rule details
Item | Description |
---|---|
Rule name | ram-user-no-policy-check |
Rule ID | ram-user-no-policy-check |
Tag | RAM and User |
Automatic remediation | Not supported |
Trigger type | Periodic execution |
Time interval | 24 hours |
Supported resource type | RAM user |
Input parameter | None |
Non-compliance remediation
Detach the policy from the RAM user . For more information, see Remove permissions from a RAM user.