iam-customer-policy-blocked-kms-actions
Checks if the managed Amazon Identity and Access Management (IAM) policies that you create do not allow blocked KMS actions on all Amazon KMS key resources. The rule is NON_COMPLIANT if any blocked action is allowed on all Amazon KMS keys by the managed IAM policy.
Note
To be considered non-public, an IAM policy must grant access only to fixed values. This means values that don't contain a wildcard or the following IAM policy element: Variables.
Identifier: IAM_CUSTOMER_POLICY_BLOCKED_KMS_ACTIONS
Resource Types: AWS::IAM::Policy
Trigger type: Configuration changes
Amazon Web Services Region: All supported Amazon regions except Asia Pacific (Thailand), Middle East (UAE), Asia Pacific (Hyderabad), Asia Pacific (Malaysia), Asia Pacific (Melbourne), Mexico (Central), Israel (Tel Aviv), Asia Pacific (Taipei), Canada West (Calgary), Europe (Spain), Europe (Zurich) Region
Parameters:
- blockedActionsPatterns
- Type: CSV
-
Comma-separated list of blocked KMS action patterns for the rule to check. The rule is NON_COMPLIANT if IAM customer managed policies allow wildcard access to all resources for the actions you specify.
- excludePermissionBoundaryPolicy (Optional)
- Type: boolean
-
Boolean flag to exclude the evaluation of IAM policies used as permissions boundaries. If set to 'true', the rule will not include permissions boundaries in the evaluation. Otherwise, all IAM policies in scope are evaluated when value is set to 'false.' Default value is 'false'.
Amazon CloudFormation template
To create Amazon Config managed rules with Amazon CloudFormation templates, see Creating Amazon Config Managed Rules With Amazon CloudFormation Templates.