/AWS1/CL_AANINTERNALACCESSDETS¶
Contains information about an internal access finding. This includes details about the access that was identified within your Amazon Web Services organization or account.
CONSTRUCTOR¶
IMPORTING¶
Optional arguments:¶
it_action TYPE /AWS1/CL_AANACTIONLIST_W=>TT_ACTIONLIST TT_ACTIONLIST¶
The action in the analyzed policy statement that has internal access permission to use.
it_condition TYPE /AWS1/CL_AANCONDITIONKEYMAP_W=>TT_CONDITIONKEYMAP TT_CONDITIONKEYMAP¶
The condition in the analyzed policy statement that resulted in an internal access finding.
it_principal TYPE /AWS1/CL_AANPRINCIPALMAP_W=>TT_PRINCIPALMAP TT_PRINCIPALMAP¶
The principal that has access to a resource within the internal environment.
iv_principalowneraccount TYPE /AWS1/AANSTRING /AWS1/AANSTRING¶
The Amazon Web Services account ID that owns the principal identified in the internal access finding.
iv_accesstype TYPE /AWS1/AANINTERNALACCESSTYPE /AWS1/AANINTERNALACCESSTYPE¶
The type of internal access identified in the finding. This indicates how the access is granted within your Amazon Web Services environment.
iv_principaltype TYPE /AWS1/AANPRINCIPALTYPE /AWS1/AANPRINCIPALTYPE¶
The type of principal identified in the internal access finding, such as IAM role or IAM user.
it_sources TYPE /AWS1/CL_AANFINDINGSOURCE=>TT_FINDINGSOURCELIST TT_FINDINGSOURCELIST¶
The sources of the internal access finding. This indicates how the access that generated the finding is granted within your Amazon Web Services environment.
iv_resourcectlplyrestriction TYPE /AWS1/AANRESRCCTLPLYRESTRICT00 /AWS1/AANRESRCCTLPLYRESTRICT00¶
The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).
APPLICABLE: There is an RCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. For example, ifs3:DeleteObjectis blocked by the RCP and the restriction isAPPLICABLE, thens3:DeleteObjectwould still be included in the list of actions for the finding. Only applicable to internal access findings with the account as the zone of trust.
FAILED_TO_EVALUATE_RCP: There was an error evaluating the RCP.
NOT_APPLICABLE: There was no RCP present in the organization. For internal access findings with the account as the zone of trust,NOT_APPLICABLEcould also indicate that there was no RCP applicable to the resource.
APPLIED: An RCP is present in the organization and IAM Access Analyzer included it in the evaluation of effective permissions. For example, ifs3:DeleteObjectis blocked by the RCP and the restriction isAPPLIED, thens3:DeleteObjectwould not be included in the list of actions for the finding. Only applicable to internal access findings with the organization as the zone of trust.
iv_svcctlpolicyrestriction TYPE /AWS1/AANSVCCTLPLYRESTRICTION /AWS1/AANSVCCTLPLYRESTRICTION¶
The type of restriction applied to the finding by an Organizations service control policy (SCP).
APPLICABLE: There is an SCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. Only applicable to internal access findings with the account as the zone of trust.
FAILED_TO_EVALUATE_SCP: There was an error evaluating the SCP.
NOT_APPLICABLE: There was no SCP present in the organization. For internal access findings with the account as the zone of trust,NOT_APPLICABLEcould also indicate that there was no SCP applicable to the principal.
APPLIED: An SCP is present in the organization and IAM Access Analyzer included it in the evaluation of effective permissions. Only applicable to internal access findings with the organization as the zone of trust.
Queryable Attributes¶
action¶
The action in the analyzed policy statement that has internal access permission to use.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_ACTION() |
Getter for ACTION, with configurable default |
ASK_ACTION() |
Getter for ACTION w/ exceptions if field has no value |
HAS_ACTION() |
Determine if ACTION has a value |
condition¶
The condition in the analyzed policy statement that resulted in an internal access finding.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_CONDITION() |
Getter for CONDITION, with configurable default |
ASK_CONDITION() |
Getter for CONDITION w/ exceptions if field has no value |
HAS_CONDITION() |
Determine if CONDITION has a value |
principal¶
The principal that has access to a resource within the internal environment.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_PRINCIPAL() |
Getter for PRINCIPAL, with configurable default |
ASK_PRINCIPAL() |
Getter for PRINCIPAL w/ exceptions if field has no value |
HAS_PRINCIPAL() |
Determine if PRINCIPAL has a value |
principalOwnerAccount¶
The Amazon Web Services account ID that owns the principal identified in the internal access finding.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_PRINCIPALOWNERACCOUNT() |
Getter for PRINCIPALOWNERACCOUNT, with configurable default |
ASK_PRINCIPALOWNERACCOUNT() |
Getter for PRINCIPALOWNERACCOUNT w/ exceptions if field has |
HAS_PRINCIPALOWNERACCOUNT() |
Determine if PRINCIPALOWNERACCOUNT has a value |
accessType¶
The type of internal access identified in the finding. This indicates how the access is granted within your Amazon Web Services environment.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_ACCESSTYPE() |
Getter for ACCESSTYPE, with configurable default |
ASK_ACCESSTYPE() |
Getter for ACCESSTYPE w/ exceptions if field has no value |
HAS_ACCESSTYPE() |
Determine if ACCESSTYPE has a value |
principalType¶
The type of principal identified in the internal access finding, such as IAM role or IAM user.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_PRINCIPALTYPE() |
Getter for PRINCIPALTYPE, with configurable default |
ASK_PRINCIPALTYPE() |
Getter for PRINCIPALTYPE w/ exceptions if field has no value |
HAS_PRINCIPALTYPE() |
Determine if PRINCIPALTYPE has a value |
sources¶
The sources of the internal access finding. This indicates how the access that generated the finding is granted within your Amazon Web Services environment.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_SOURCES() |
Getter for SOURCES, with configurable default |
ASK_SOURCES() |
Getter for SOURCES w/ exceptions if field has no value |
HAS_SOURCES() |
Determine if SOURCES has a value |
resourceControlPolicyRestriction¶
The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).
APPLICABLE: There is an RCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. For example, ifs3:DeleteObjectis blocked by the RCP and the restriction isAPPLICABLE, thens3:DeleteObjectwould still be included in the list of actions for the finding. Only applicable to internal access findings with the account as the zone of trust.
FAILED_TO_EVALUATE_RCP: There was an error evaluating the RCP.
NOT_APPLICABLE: There was no RCP present in the organization. For internal access findings with the account as the zone of trust,NOT_APPLICABLEcould also indicate that there was no RCP applicable to the resource.
APPLIED: An RCP is present in the organization and IAM Access Analyzer included it in the evaluation of effective permissions. For example, ifs3:DeleteObjectis blocked by the RCP and the restriction isAPPLIED, thens3:DeleteObjectwould not be included in the list of actions for the finding. Only applicable to internal access findings with the organization as the zone of trust.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_RESRCCTLPLYRESTRICTION() |
Getter for RESOURCECTLPOLICYRESTRICTION, with configurable d |
ASK_RESRCCTLPLYRESTRICTION() |
Getter for RESOURCECTLPOLICYRESTRICTION w/ exceptions if fie |
HAS_RESRCCTLPLYRESTRICTION() |
Determine if RESOURCECTLPOLICYRESTRICTION has a value |
serviceControlPolicyRestriction¶
The type of restriction applied to the finding by an Organizations service control policy (SCP).
APPLICABLE: There is an SCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. Only applicable to internal access findings with the account as the zone of trust.
FAILED_TO_EVALUATE_SCP: There was an error evaluating the SCP.
NOT_APPLICABLE: There was no SCP present in the organization. For internal access findings with the account as the zone of trust,NOT_APPLICABLEcould also indicate that there was no SCP applicable to the principal.
APPLIED: An SCP is present in the organization and IAM Access Analyzer included it in the evaluation of effective permissions. Only applicable to internal access findings with the organization as the zone of trust.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_SVCCTLPOLICYRESTRICTION() |
Getter for SVCCONTROLPOLICYRESTRICTION, with configurable de |
ASK_SVCCTLPOLICYRESTRICTION() |
Getter for SVCCONTROLPOLICYRESTRICTION w/ exceptions if fiel |
HAS_SVCCTLPOLICYRESTRICTION() |
Determine if SVCCONTROLPOLICYRESTRICTION has a value |