Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review and possible correct AWS IAM policy ARN #1802

Open
ChrisMcGowan opened this issue Nov 18, 2024 · 0 comments
Open

Review and possible correct AWS IAM policy ARN #1802

ChrisMcGowan opened this issue Nov 18, 2024 · 0 comments

Comments

@ChrisMcGowan
Copy link
Contributor

Per AWS
Description
We are contacting you because AWS Identity and Access Management (IAM) is changing how it validates IAM resource ARNs that are passed to IAM APIs. You may need to take action to update parameters that you pass to IAM APIs in your AWS account. Please refer to the 'Affected resources' tab for a list of IAM APIs for which you may have to update parameters.

In our effort to constantly improve security, IAM has recently started to strictly validate all elements of an IAM resource ARN that you pass as a parameter to an IAM API call. The input ARN must now meet the following conditions:

  1. The partition name must match the partition of the AWS account from where you are calling the API.
  2. The service name must be 'iam'.
  3. The region code must be blank, as IAM resources are global.
  4. The resource type must be a valid IAM resource type [1].
  5. There must not be any trailing spaces in the ARN.

Additionally, we recommend you ensure that the resource ARN strings you pass to IAM APIs and/or use in IAM policies exactly match the resource ARN of your intended resource. Any mismatch in the ARN strings may lead to API errors or unexpected authorization decisions.

To ensure workflow continuity, we have allow-listed your account for IAM API calls that violated one or more of the previously specified input ARN validations.

We recommend that you review and update your IAM API calls and relevant IAM policies in your AWS account by January 31, 2025 to ensure that input ARNs align with the specified validations. After this date, the specified ARN validations will be enforced in your AWS account.

Effected Resource: IAM Policy AttachUserPolicy

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant