Features and benefits - Account Assessment for AWS Organizations

Features and benefits

The Account Assessment for AWS Organizations solution provides the following features.

Access the solution using a web UI

This solution provides a web UI to help you view scan results. For more details, see Use the solution.

Identify enabled services with AWS Organizations

In your AWS Organization, you can enable more than 30 compatible AWS services to perform operations across all of the AWS accounts. This solution finds enabled services and delegated admin accounts per service (if activated).

Explore your policies to find actions and conditions

This feature allows you to search through all the policies across your AWS Organization to find specific conditions and actions. In case an action is deprecated you need to remove or update a given action or condition across all accounts or a specific set of accounts, you can quickly find and review the policies in the solutions UI, and update them across your environment to meet your needs.

The policies included in the scans are identity-based policies, resource-based policies, and organization-based policies (such as service control policies). The daily scan will store representations of all the policies in your environment in DynamoDB on a daily basis, so you can search through them, and find the attributes you are looking for in the solution’s web UI.

Assess IAM policy conditions

The Condition policy element lets you use keys to specify conditions for when a policy is in effect. You can use specific keys to compare the identifier or path of the requesting principal’s Organization in AWS Organizations with the identifier specified in the policy. This helps you identify existing conditions and dependencies. If desired, you can use global condition keys. This solution scans conditions in the following types of policies and presents them for your review in the solution’s web UI.

Assume role (trust relationship) conditions

With IAM roles, you can establish trust relationships between your trusting account (the account that owns the resource) and other AWS trusted accounts (the accounts that contain the users that need to access the resource). In this trust relationship, you can use condition keys to grant permissions to any principal in your AWS Organization.

Identity-based policy conditions

Identity-based policies are attached to a user, group, or role. Use these policies to specify permissions for a given identity.

Resource-based policy conditions

Resource-based policies are attached to a resource. Use these policies to specify who has access to the resource and what actions they can perform on it. For example, you can attach resource-based policies to Amazon Simple Storage Service (Amazon S3) buckets, Amazon Simple Queue Service (Amazon SQS) queues, Amazon Virtual Private Cloud (Amazon VPC) endpoints, and AWS Key Management Service (AWS KMS) encryption keys.

The following table provides a list of services supported by this solution.

AWS service Policy type

Amazon API Gateway

Resource-based

AWS Backup

Resource-based

AWS CloudFormation

Resource-based

AWS CodeArtifact

Resource-based

AWS CodeBuild

Resource-based

AWS Config

Resource-based

Amazon Elastic Container Registry (Amazon ECR)

Resource-based

Amazon Elastic File System (Amazon EFS)

Resource-based

AWS Elemental MediaStore

Resource-based

Amazon EventBridge

Resource-based

AWS Glue

Resource-based

AWS Identity and Access Management (IAM)

Identity-based

AWS IoT Core

Resource-based

AWS Key Management Service (AWS KMS)

Resource-based

AWS Lambda

Resource-based

Amazon OpenSearch Service

Resource-based

AWS Secrets Manager

Resource-based

AWS Serverless Application Repository

Resource-based

Amazon Simple Email Service (Amazon SES)

Resource-based

Amazon Simple Notification Service (Amazon SNS)

Resource-based

Amazon Simple Queue Service (Amazon SQS)

Resource-based

Amazon Simple Storage Service (Amazon S3)

Resource-based

Amazon S3 Glacier

Resource-based

AWS Systems Manager (AWS Systems Manager Incident Manager)

Resource-based

Amazon Virtual Private Cloud (Amazon VPC) (VPC Endpoints)

Resource-based

AWS Resource Access Manager (Amazon RAM)

Resource-based

Amazon EventBridge Schemas

Resource-based

AWS Systems Manager Incident Manager Contacts

Resource-based

Amazon Lex

Resource-based

ACM-PCA (AWS Certificate Manager Private Certificate Authority)

Resource-based