The following table shows the list of IAM Users, Groups, and Roles in the account, and their associated policies.

If the policy contains IAM Actions - or combinations of actions - that fall under certain risk categories - Infrastructure Modification, Privilege Escalation, Resource Exposure, or Data Exfiltration - then the number of occurrences per-policy and per-risk is included in the table.

If the IAM principal is a Role and is assumable by a Compute Service - ec2, ecs-tasks, lambda, or eks - then that is indicated in the table as well.

Note that policies that were excluded from the scan will not have their statistics shown in the table. Please refer to the Exclusions configuration to see which ones were excluded.


{% for principal in t["principal_policy_mapping"] %} {% endfor %}
Type Name Policy Type Managed By Policy Name Infrastructure Modification Privilege Escalation Resource Exposure Data Exfiltration Group Membership
{{ principal["Type"] }} {{ principal["Principal"] }} {% if principal["PolicyType"] == "Managed" %} {{ principal["PolicyType"] }}{% endif %}{% if principal["PolicyType"] == "Inline" %} {{ principal["PolicyType"] }}{% endif %} {% if principal["ManagedBy"] == "AWS" %} {{ principal["ManagedBy"] }}{% endif %}{% if principal["ManagedBy"] == "Customer" %} {{ principal["ManagedBy"] }}{% endif %} {{ principal["PolicyName"] }} {{ principal["Actions"] }} {{ principal["PrivilegeEscalation"] }} {{ principal["PermissionsManagementActions"] }} {{ principal["DataExfiltrationActions"] }} {% if principal["GroupMembership"] %}{% if principal["GroupMembership"]|length > 0 %}{% for group in principal["GroupMembership"] %}{{ group }}{% if not loop.last %}, {% endif %}{% endfor %}{% endif %}{% endif %}