iam-user-no-policies-check
Checks if none of your Amazon Identity and Access Management (IAM) users have policies attached. IAM users must inherit permissions from IAM groups or roles. The rule is NON_COMPLIANT if there is at least one IAM user with policies attached.
Identifier: IAM_USER_NO_POLICIES_CHECK
Resource Types: AWS::IAM::User
Trigger type: Configuration changes
Amazon Web Services Region: All supported Amazon regions
Parameters:
- None
Amazon CloudFormation template
To create Amazon Config managed rules with Amazon CloudFormation templates, see Creating Amazon Config Managed Rules With Amazon CloudFormation Templates.