AWS Config
Developer Guide

iam-role-managed-policy-check

Checks that the AWS Identity and Access Management (IAM) role is attached to all AWS managed policies specified in the list of managed policies. The rule is NON_COMPLIANT if the IAM role is not attached to the IAM managed policy.

Identifier: IAM_ROLE_MANAGED_POLICY_CHECK

Trigger type: Configuration changes

Parameters:

managedPolicyNames

Comma-separated list of AWS managed policy ARNs.

AWS CloudFormation template

To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.

View Launch

View