

# sqs-queue-no-public-access
<a name="sqs-queue-no-public-access"></a>

Checks if the SQS queue access policy allows public access. The rule is NON\$1COMPLIANT if the SQS queue access policy allows public access. 

**Note**  
To be considered non-public, an SQS policy must grant access only to fixed values. This means values that don't contain a wildcard or the following IAM policy element: [Variables](https://docs.amazonaws.cn/IAM/latest/UserGuide/reference_policies_variables.html#policy-vars-using-variables).

**Identifier:** SQS\$1QUEUE\$1NO\$1PUBLIC\$1ACCESS

**Resource Types:** AWS::SQS::Queue

**Trigger type:** Configuration changes

**Amazon Web Services Region:** All supported Amazon regions except Asia Pacific (New Zealand), Asia Pacific (Thailand), Asia Pacific (Jakarta), Middle East (UAE), Asia Pacific (Hyderabad), Asia Pacific (Malaysia), Asia Pacific (Melbourne), Amazon GovCloud (US-East), Amazon GovCloud (US-West), Mexico (Central), Israel (Tel Aviv), Asia Pacific (Taipei), Canada West (Calgary), Europe (Spain), Europe (Zurich) Region

**Parameters:**

None  

## Amazon CloudFormation template
<a name="w2aac20c16c17b7e1515c19"></a>

To create Amazon Config managed rules with Amazon CloudFormation templates, see [Creating Amazon Config Managed Rules With Amazon CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).