Skip to content

Commit cc61f23

Browse files
author
awstools
committed
feat(client-accessanalyzer): We are launching a new analyzer type, internal access analyzer. The new analyzer will generate internal access findings, which help customers understand who within their AWS organization or AWS Account has access to their critical AWS resources.
1 parent 95f166d commit cc61f23

27 files changed

+1221
-1293
lines changed

clients/client-accessanalyzer/README.md

Lines changed: 1 addition & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -6,30 +6,7 @@
66

77
AWS SDK for JavaScript AccessAnalyzer Client for Node.js, Browser and React Native.
88

9-
<p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
10-
a suite of capabilities. Its features include findings for external and unused access,
11-
basic and custom policy checks for validating policies, and policy generation to generate
12-
fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
13-
you first need to create an analyzer.</p>
14-
<p>
15-
<b>External access analyzers</b> help identify potential risks
16-
of accessing resources by enabling you to identify any resource policies that grant access
17-
to an external principal. It does this by using logic-based reasoning to analyze
18-
resource-based policies in your Amazon Web Services environment. An external principal can be another
19-
Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
20-
anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
21-
to your resources before deploying permissions changes.</p>
22-
<p>
23-
<b>Unused access analyzers</b> help identify potential
24-
identity access risks by enabling you to identify unused IAM roles, unused access keys,
25-
unused console passwords, and IAM principals with unused service and action-level
26-
permissions.</p>
27-
<p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
28-
policies before deploying permissions changes. You can use policy generation to refine
29-
permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
30-
<p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
31-
For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
32-
<b>IAM User Guide</b>.</p>
9+
<p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
3310

3411
## Installing
3512

clients/client-accessanalyzer/src/AccessAnalyzer.ts

Lines changed: 1 addition & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -788,30 +788,7 @@ export interface AccessAnalyzer {
788788
}
789789

790790
/**
791-
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
792-
* a suite of capabilities. Its features include findings for external and unused access,
793-
* basic and custom policy checks for validating policies, and policy generation to generate
794-
* fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
795-
* you first need to create an analyzer.</p>
796-
* <p>
797-
* <b>External access analyzers</b> help identify potential risks
798-
* of accessing resources by enabling you to identify any resource policies that grant access
799-
* to an external principal. It does this by using logic-based reasoning to analyze
800-
* resource-based policies in your Amazon Web Services environment. An external principal can be another
801-
* Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
802-
* anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
803-
* to your resources before deploying permissions changes.</p>
804-
* <p>
805-
* <b>Unused access analyzers</b> help identify potential
806-
* identity access risks by enabling you to identify unused IAM roles, unused access keys,
807-
* unused console passwords, and IAM principals with unused service and action-level
808-
* permissions.</p>
809-
* <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
810-
* policies before deploying permissions changes. You can use policy generation to refine
811-
* permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
812-
* <p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
813-
* For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
814-
* <b>IAM User Guide</b>.</p>
791+
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
815792
* @public
816793
*/
817794
export class AccessAnalyzer extends AccessAnalyzerClient implements AccessAnalyzer {}

clients/client-accessanalyzer/src/AccessAnalyzerClient.ts

Lines changed: 1 addition & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -415,30 +415,7 @@ export type AccessAnalyzerClientResolvedConfigType = __SmithyResolvedConfigurati
415415
export interface AccessAnalyzerClientResolvedConfig extends AccessAnalyzerClientResolvedConfigType {}
416416

417417
/**
418-
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
419-
* a suite of capabilities. Its features include findings for external and unused access,
420-
* basic and custom policy checks for validating policies, and policy generation to generate
421-
* fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
422-
* you first need to create an analyzer.</p>
423-
* <p>
424-
* <b>External access analyzers</b> help identify potential risks
425-
* of accessing resources by enabling you to identify any resource policies that grant access
426-
* to an external principal. It does this by using logic-based reasoning to analyze
427-
* resource-based policies in your Amazon Web Services environment. An external principal can be another
428-
* Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
429-
* anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
430-
* to your resources before deploying permissions changes.</p>
431-
* <p>
432-
* <b>Unused access analyzers</b> help identify potential
433-
* identity access risks by enabling you to identify unused IAM roles, unused access keys,
434-
* unused console passwords, and IAM principals with unused service and action-level
435-
* permissions.</p>
436-
* <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
437-
* policies before deploying permissions changes. You can use policy generation to refine
438-
* permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
439-
* <p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
440-
* For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
441-
* <b>IAM User Guide</b>.</p>
418+
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
442419
* @public
443420
*/
444421
export class AccessAnalyzerClient extends __Client<

clients/client-accessanalyzer/src/commands/ApplyArchiveRuleCommand.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,7 @@ export interface ApplyArchiveRuleCommandInput extends ApplyArchiveRuleRequest {}
2828
export interface ApplyArchiveRuleCommandOutput extends __MetadataBearer {}
2929

3030
/**
31-
* <p>Retroactively applies the archive rule to existing findings that meet the archive rule
32-
* criteria.</p>
31+
* <p>Retroactively applies the archive rule to existing findings that meet the archive rule criteria.</p>
3332
* @example
3433
* Use a bare-bones client and the command you need to make an API call.
3534
* ```javascript

clients/client-accessanalyzer/src/commands/CheckNoNewAccessCommand.ts

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,12 +32,7 @@ export interface CheckNoNewAccessCommandInput extends CheckNoNewAccessRequest {}
3232
export interface CheckNoNewAccessCommandOutput extends CheckNoNewAccessResponse, __MetadataBearer {}
3333

3434
/**
35-
* <p>Checks whether new access is allowed for an updated policy when compared to the existing
36-
* policy.</p>
37-
* <p>You can find examples for reference policies and learn how to set up and run a custom
38-
* policy check for new access in the <a href="https://github.com/aws-samples/iam-access-analyzer-custom-policy-check-samples">IAM Access Analyzer custom policy checks samples</a> repository on GitHub. The reference
39-
* policies in this repository are meant to be passed to the
40-
* <code>existingPolicyDocument</code> request parameter.</p>
35+
* <p>Checks whether new access is allowed for an updated policy when compared to the existing policy.</p> <p>You can find examples for reference policies and learn how to set up and run a custom policy check for new access in the <a href="https://github.com/aws-samples/iam-access-analyzer-custom-policy-check-samples">IAM Access Analyzer custom policy checks samples</a> repository on GitHub. The reference policies in this repository are meant to be passed to the <code>existingPolicyDocument</code> request parameter.</p>
4136
* @example
4237
* Use a bare-bones client and the command you need to make an API call.
4338
* ```javascript

clients/client-accessanalyzer/src/commands/CheckNoPublicAccessCommand.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,7 @@ export interface CheckNoPublicAccessCommandInput extends CheckNoPublicAccessRequ
3232
export interface CheckNoPublicAccessCommandOutput extends CheckNoPublicAccessResponse, __MetadataBearer {}
3333

3434
/**
35-
* <p>Checks whether a resource policy can grant public access to the specified resource
36-
* type.</p>
35+
* <p>Checks whether a resource policy can grant public access to the specified resource type.</p>
3736
* @example
3837
* Use a bare-bones client and the command you need to make an API call.
3938
* ```javascript

clients/client-accessanalyzer/src/commands/CreateAccessPreviewCommand.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,7 @@ export interface CreateAccessPreviewCommandInput extends CreateAccessPreviewRequ
2828
export interface CreateAccessPreviewCommandOutput extends CreateAccessPreviewResponse, __MetadataBearer {}
2929

3030
/**
31-
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
32-
* resource before deploying resource permissions.</p>
31+
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your resource before deploying resource permissions.</p>
3332
* @example
3433
* Use a bare-bones client and the command you need to make an API call.
3534
* ```javascript

clients/client-accessanalyzer/src/commands/CreateAnalyzerCommand.ts

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,23 @@ export interface CreateAnalyzerCommandOutput extends CreateAnalyzerResponse, __M
7979
* ],
8080
* },
8181
* },
82+
* internalAccess: { // InternalAccessConfiguration
83+
* analysisRule: { // InternalAccessAnalysisRule
84+
* inclusions: [ // InternalAccessAnalysisRuleCriteriaList
85+
* { // InternalAccessAnalysisRuleCriteria
86+
* accountIds: [
87+
* "STRING_VALUE",
88+
* ],
89+
* resourceTypes: [ // ResourceTypeList
90+
* "STRING_VALUE",
91+
* ],
92+
* resourceArns: [ // ResourceArnsList
93+
* "STRING_VALUE",
94+
* ],
95+
* },
96+
* ],
97+
* },
98+
* },
8299
* },
83100
* };
84101
* const command = new CreateAnalyzerCommand(input);

clients/client-accessanalyzer/src/commands/CreateArchiveRuleCommand.ts

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,7 @@ export interface CreateArchiveRuleCommandInput extends CreateArchiveRuleRequest
2828
export interface CreateArchiveRuleCommandOutput extends __MetadataBearer {}
2929

3030
/**
31-
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
32-
* new findings that meet the criteria you define when you create the rule.</p>
33-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
31+
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p> <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
3432
* @example
3533
* Use a bare-bones client and the command you need to make an API call.
3634
* ```javascript

clients/client-accessanalyzer/src/commands/DeleteAnalyzerCommand.ts

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,7 @@ export interface DeleteAnalyzerCommandInput extends DeleteAnalyzerRequest {}
2828
export interface DeleteAnalyzerCommandOutput extends __MetadataBearer {}
2929

3030
/**
31-
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
32-
* for the account or organization in the current or specific Region. All findings that were
33-
* generated by the analyzer are deleted. You cannot undo this action.</p>
31+
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled for the account or organization in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.</p>
3432
* @example
3533
* Use a bare-bones client and the command you need to make an API call.
3634
* ```javascript

0 commit comments

Comments
 (0)