Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: CC-BY-SA-4.0
The IAM Access Analyzer solution enables AWS IAM Access Analyzer by delegating administration to a member account within the Organization management account. It then configures Access Analyzer within the delegated administrator account
for all the
existing and future AWS Organization accounts.
In addition to the organization deployment, the solution deploys AWS Access Analyzer to all the member accounts and regions for analyzing account level permissions.
- All resources are deployed via AWS CloudFormation as a
StackSet
andStack Instance
within the management account or a CloudFormationStack
within a specific account. - The Customizations for AWS Control Tower solution deploys all templates as a CloudFormation
StackSet
. - For parameter details, review the AWS CloudFormation templates.
- AWS Organizations is used to delegate an administrator account for AWS Access Analyzer Delegated Administrator Account
- See Common Register Delegated Administrator
AWS IAM Access Analyzer is configured to monitor supported resources for the AWS Account zone of trust.
- AWS IAM Access Analyzer is configured to monitor supported resources for the AWS Organization zone of trust.
- Register a delegated administrator using the Common Register Delegated Administrator solution
- pServicePrincipalList = "access-analyzer.amazonaws.com"
- In the
management account (home region)
, launch an AWS CloudFormation Stack Set and deploy toAll active accounts
in allGoverned Regions
using the sra-iam-access-analyzer-account.yaml template file as the source. Note: Include themanagement account
in the account list so that the IAM service-linked role is created, which is required for the next step. - In the
management account (home region)
, launch an AWS CloudFormation Stack Set and deploy to theAudit account
in allGoverned Regions
using the sra-iam-access-analyzer-org.yaml template file as the source.
- Log into the Audit account and navigate to the IAM Access Analyzer page
- Verify that there are 2 Access Analyzers (account and organization)
- Verify all existing accounts/regions have an account Access Analyzer
- In the
management account (home region)
, delete the AWS CloudFormation StackSet created in step 2 of the solution deployment. Note: there should not be anystack instances
associated with this StackSet. - In the
management account (home region)
, delete the AWS CloudFormation StackSet created in step 1 of the solution deployment. Note: there should not be anystack instances
associated with this StackSet. - Clean up the
delegated administrator
registered in the Prerequisites