@aws-sdk/client-accessanalyzer 3.830.0 → 3.831.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -24
- package/dist-cjs/index.js +31 -0
- package/dist-es/models/models_0.js +22 -0
- package/dist-es/protocols/Aws_restJson1.js +5 -0
- package/dist-types/AccessAnalyzer.d.ts +1 -24
- package/dist-types/AccessAnalyzerClient.d.ts +1 -24
- package/dist-types/commands/ApplyArchiveRuleCommand.d.ts +1 -2
- package/dist-types/commands/CheckNoNewAccessCommand.d.ts +1 -6
- package/dist-types/commands/CheckNoPublicAccessCommand.d.ts +1 -2
- package/dist-types/commands/CreateAccessPreviewCommand.d.ts +1 -2
- package/dist-types/commands/CreateAnalyzerCommand.d.ts +17 -0
- package/dist-types/commands/CreateArchiveRuleCommand.d.ts +1 -3
- package/dist-types/commands/DeleteAnalyzerCommand.d.ts +1 -3
- package/dist-types/commands/GetAnalyzerCommand.d.ts +17 -0
- package/dist-types/commands/GetArchiveRuleCommand.d.ts +1 -2
- package/dist-types/commands/GetFindingCommand.d.ts +1 -4
- package/dist-types/commands/GetFindingV2Command.d.ts +29 -7
- package/dist-types/commands/GetFindingsStatisticsCommand.d.ts +13 -2
- package/dist-types/commands/GetGeneratedPolicyCommand.d.ts +1 -2
- package/dist-types/commands/ListAccessPreviewFindingsCommand.d.ts +1 -2
- package/dist-types/commands/ListAnalyzedResourcesCommand.d.ts +1 -2
- package/dist-types/commands/ListAnalyzersCommand.d.ts +17 -0
- package/dist-types/commands/ListFindingsCommand.d.ts +1 -5
- package/dist-types/commands/ListFindingsV2Command.d.ts +1 -5
- package/dist-types/commands/UpdateAnalyzerCommand.d.ts +34 -0
- package/dist-types/commands/ValidatePolicyCommand.d.ts +1 -3
- package/dist-types/index.d.ts +1 -24
- package/dist-types/models/models_0.d.ts +455 -899
- package/dist-types/ts3.4/models/models_0.d.ts +117 -18
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -6,30 +6,7 @@
|
|
|
6
6
|
|
|
7
7
|
AWS SDK for JavaScript AccessAnalyzer Client for Node.js, Browser and React Native.
|
|
8
8
|
|
|
9
|
-
<p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
|
|
10
|
-
a suite of capabilities. Its features include findings for external and unused access,
|
|
11
|
-
basic and custom policy checks for validating policies, and policy generation to generate
|
|
12
|
-
fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
|
|
13
|
-
you first need to create an analyzer.</p>
|
|
14
|
-
<p>
|
|
15
|
-
<b>External access analyzers</b> help identify potential risks
|
|
16
|
-
of accessing resources by enabling you to identify any resource policies that grant access
|
|
17
|
-
to an external principal. It does this by using logic-based reasoning to analyze
|
|
18
|
-
resource-based policies in your Amazon Web Services environment. An external principal can be another
|
|
19
|
-
Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
|
|
20
|
-
anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
|
|
21
|
-
to your resources before deploying permissions changes.</p>
|
|
22
|
-
<p>
|
|
23
|
-
<b>Unused access analyzers</b> help identify potential
|
|
24
|
-
identity access risks by enabling you to identify unused IAM roles, unused access keys,
|
|
25
|
-
unused console passwords, and IAM principals with unused service and action-level
|
|
26
|
-
permissions.</p>
|
|
27
|
-
<p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
|
|
28
|
-
policies before deploying permissions changes. You can use policy generation to refine
|
|
29
|
-
permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
|
|
30
|
-
<p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
|
|
31
|
-
For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
|
|
32
|
-
<b>IAM User Guide</b>.</p>
|
|
9
|
+
<p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
|
|
33
10
|
|
|
34
11
|
## Installing
|
|
35
12
|
|
package/dist-cjs/index.js
CHANGED
|
@@ -64,6 +64,7 @@ __export(index_exports, {
|
|
|
64
64
|
GetFindingV2Command: () => GetFindingV2Command,
|
|
65
65
|
GetFindingsStatisticsCommand: () => GetFindingsStatisticsCommand,
|
|
66
66
|
GetGeneratedPolicyCommand: () => GetGeneratedPolicyCommand,
|
|
67
|
+
InternalAccessType: () => InternalAccessType,
|
|
67
68
|
InternalServerException: () => InternalServerException,
|
|
68
69
|
InvalidParameterException: () => InvalidParameterException,
|
|
69
70
|
JobErrorCode: () => JobErrorCode,
|
|
@@ -82,6 +83,7 @@ __export(index_exports, {
|
|
|
82
83
|
NetworkOriginConfiguration: () => NetworkOriginConfiguration,
|
|
83
84
|
PathElement: () => PathElement,
|
|
84
85
|
PolicyType: () => PolicyType,
|
|
86
|
+
PrincipalType: () => PrincipalType,
|
|
85
87
|
RdsDbClusterSnapshotAttributeValue: () => RdsDbClusterSnapshotAttributeValue,
|
|
86
88
|
RdsDbSnapshotAttributeValue: () => RdsDbSnapshotAttributeValue,
|
|
87
89
|
RecommendationType: () => RecommendationType,
|
|
@@ -89,6 +91,7 @@ __export(index_exports, {
|
|
|
89
91
|
RecommendedStep: () => RecommendedStep,
|
|
90
92
|
ResourceControlPolicyRestriction: () => ResourceControlPolicyRestriction,
|
|
91
93
|
ResourceNotFoundException: () => ResourceNotFoundException,
|
|
94
|
+
ServiceControlPolicyRestriction: () => ServiceControlPolicyRestriction,
|
|
92
95
|
ServiceQuotaExceededException: () => ServiceQuotaExceededException,
|
|
93
96
|
StartPolicyGenerationCommand: () => StartPolicyGenerationCommand,
|
|
94
97
|
StartResourceScanCommand: () => StartResourceScanCommand,
|
|
@@ -493,6 +496,7 @@ var AnalyzerConfiguration;
|
|
|
493
496
|
((AnalyzerConfiguration3) => {
|
|
494
497
|
AnalyzerConfiguration3.visit = /* @__PURE__ */ __name((value, visitor) => {
|
|
495
498
|
if (value.unusedAccess !== void 0) return visitor.unusedAccess(value.unusedAccess);
|
|
499
|
+
if (value.internalAccess !== void 0) return visitor.internalAccess(value.internalAccess);
|
|
496
500
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
497
501
|
}, "visit");
|
|
498
502
|
})(AnalyzerConfiguration || (AnalyzerConfiguration = {}));
|
|
@@ -662,6 +666,7 @@ var AccessPreviewStatusReasonCode = {
|
|
|
662
666
|
};
|
|
663
667
|
var ResourceControlPolicyRestriction = {
|
|
664
668
|
APPLICABLE: "APPLICABLE",
|
|
669
|
+
APPLIED: "APPLIED",
|
|
665
670
|
FAILED_TO_EVALUATE_RCP: "FAILED_TO_EVALUATE_RCP",
|
|
666
671
|
NOT_APPLICABLE: "NOT_APPLICABLE"
|
|
667
672
|
};
|
|
@@ -690,14 +695,31 @@ var FindingsStatistics;
|
|
|
690
695
|
FindingsStatistics2.visit = /* @__PURE__ */ __name((value, visitor) => {
|
|
691
696
|
if (value.externalAccessFindingsStatistics !== void 0)
|
|
692
697
|
return visitor.externalAccessFindingsStatistics(value.externalAccessFindingsStatistics);
|
|
698
|
+
if (value.internalAccessFindingsStatistics !== void 0)
|
|
699
|
+
return visitor.internalAccessFindingsStatistics(value.internalAccessFindingsStatistics);
|
|
693
700
|
if (value.unusedAccessFindingsStatistics !== void 0)
|
|
694
701
|
return visitor.unusedAccessFindingsStatistics(value.unusedAccessFindingsStatistics);
|
|
695
702
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
696
703
|
}, "visit");
|
|
697
704
|
})(FindingsStatistics || (FindingsStatistics = {}));
|
|
705
|
+
var InternalAccessType = {
|
|
706
|
+
INTRA_ACCOUNT: "INTRA_ACCOUNT",
|
|
707
|
+
INTRA_ORG: "INTRA_ORG"
|
|
708
|
+
};
|
|
709
|
+
var PrincipalType = {
|
|
710
|
+
IAM_ROLE: "IAM_ROLE",
|
|
711
|
+
IAM_USER: "IAM_USER"
|
|
712
|
+
};
|
|
713
|
+
var ServiceControlPolicyRestriction = {
|
|
714
|
+
APPLICABLE: "APPLICABLE",
|
|
715
|
+
APPLIED: "APPLIED",
|
|
716
|
+
FAILED_TO_EVALUATE_SCP: "FAILED_TO_EVALUATE_SCP",
|
|
717
|
+
NOT_APPLICABLE: "NOT_APPLICABLE"
|
|
718
|
+
};
|
|
698
719
|
var FindingDetails;
|
|
699
720
|
((FindingDetails3) => {
|
|
700
721
|
FindingDetails3.visit = /* @__PURE__ */ __name((value, visitor) => {
|
|
722
|
+
if (value.internalAccessDetails !== void 0) return visitor.internalAccessDetails(value.internalAccessDetails);
|
|
701
723
|
if (value.externalAccessDetails !== void 0) return visitor.externalAccessDetails(value.externalAccessDetails);
|
|
702
724
|
if (value.unusedPermissionDetails !== void 0)
|
|
703
725
|
return visitor.unusedPermissionDetails(value.unusedPermissionDetails);
|
|
@@ -711,6 +733,7 @@ var FindingDetails;
|
|
|
711
733
|
})(FindingDetails || (FindingDetails = {}));
|
|
712
734
|
var FindingType = {
|
|
713
735
|
EXTERNAL_ACCESS: "ExternalAccess",
|
|
736
|
+
INTERNAL_ACCESS: "InternalAccess",
|
|
714
737
|
UNUSED_IAM_ROLE: "UnusedIAMRole",
|
|
715
738
|
UNUSED_IAM_USER_ACCESS_KEY: "UnusedIAMUserAccessKey",
|
|
716
739
|
UNUSED_IAM_USER_PASSWORD: "UnusedIAMUserPassword",
|
|
@@ -2164,6 +2187,11 @@ var de_FindingDetails = /* @__PURE__ */ __name((output, context) => {
|
|
|
2164
2187
|
externalAccessDetails: (0, import_smithy_client._json)(output.externalAccessDetails)
|
|
2165
2188
|
};
|
|
2166
2189
|
}
|
|
2190
|
+
if (output.internalAccessDetails != null) {
|
|
2191
|
+
return {
|
|
2192
|
+
internalAccessDetails: (0, import_smithy_client._json)(output.internalAccessDetails)
|
|
2193
|
+
};
|
|
2194
|
+
}
|
|
2167
2195
|
if (output.unusedIamRoleDetails != null) {
|
|
2168
2196
|
return {
|
|
2169
2197
|
unusedIamRoleDetails: de_UnusedIamRoleDetails(output.unusedIamRoleDetails, context)
|
|
@@ -3082,6 +3110,9 @@ var paginateValidatePolicy = (0, import_core.createPaginator)(AccessAnalyzerClie
|
|
|
3082
3110
|
RecommendedStep,
|
|
3083
3111
|
Status,
|
|
3084
3112
|
FindingsStatistics,
|
|
3113
|
+
InternalAccessType,
|
|
3114
|
+
PrincipalType,
|
|
3115
|
+
ServiceControlPolicyRestriction,
|
|
3085
3116
|
FindingDetails,
|
|
3086
3117
|
FindingType,
|
|
3087
3118
|
JobErrorCode,
|
|
@@ -120,6 +120,8 @@ export var AnalyzerConfiguration;
|
|
|
120
120
|
AnalyzerConfiguration.visit = (value, visitor) => {
|
|
121
121
|
if (value.unusedAccess !== undefined)
|
|
122
122
|
return visitor.unusedAccess(value.unusedAccess);
|
|
123
|
+
if (value.internalAccess !== undefined)
|
|
124
|
+
return visitor.internalAccess(value.internalAccess);
|
|
123
125
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
124
126
|
};
|
|
125
127
|
})(AnalyzerConfiguration || (AnalyzerConfiguration = {}));
|
|
@@ -296,6 +298,7 @@ export const AccessPreviewStatusReasonCode = {
|
|
|
296
298
|
};
|
|
297
299
|
export const ResourceControlPolicyRestriction = {
|
|
298
300
|
APPLICABLE: "APPLICABLE",
|
|
301
|
+
APPLIED: "APPLIED",
|
|
299
302
|
FAILED_TO_EVALUATE_RCP: "FAILED_TO_EVALUATE_RCP",
|
|
300
303
|
NOT_APPLICABLE: "NOT_APPLICABLE",
|
|
301
304
|
};
|
|
@@ -324,14 +327,32 @@ export var FindingsStatistics;
|
|
|
324
327
|
FindingsStatistics.visit = (value, visitor) => {
|
|
325
328
|
if (value.externalAccessFindingsStatistics !== undefined)
|
|
326
329
|
return visitor.externalAccessFindingsStatistics(value.externalAccessFindingsStatistics);
|
|
330
|
+
if (value.internalAccessFindingsStatistics !== undefined)
|
|
331
|
+
return visitor.internalAccessFindingsStatistics(value.internalAccessFindingsStatistics);
|
|
327
332
|
if (value.unusedAccessFindingsStatistics !== undefined)
|
|
328
333
|
return visitor.unusedAccessFindingsStatistics(value.unusedAccessFindingsStatistics);
|
|
329
334
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
330
335
|
};
|
|
331
336
|
})(FindingsStatistics || (FindingsStatistics = {}));
|
|
337
|
+
export const InternalAccessType = {
|
|
338
|
+
INTRA_ACCOUNT: "INTRA_ACCOUNT",
|
|
339
|
+
INTRA_ORG: "INTRA_ORG",
|
|
340
|
+
};
|
|
341
|
+
export const PrincipalType = {
|
|
342
|
+
IAM_ROLE: "IAM_ROLE",
|
|
343
|
+
IAM_USER: "IAM_USER",
|
|
344
|
+
};
|
|
345
|
+
export const ServiceControlPolicyRestriction = {
|
|
346
|
+
APPLICABLE: "APPLICABLE",
|
|
347
|
+
APPLIED: "APPLIED",
|
|
348
|
+
FAILED_TO_EVALUATE_SCP: "FAILED_TO_EVALUATE_SCP",
|
|
349
|
+
NOT_APPLICABLE: "NOT_APPLICABLE",
|
|
350
|
+
};
|
|
332
351
|
export var FindingDetails;
|
|
333
352
|
(function (FindingDetails) {
|
|
334
353
|
FindingDetails.visit = (value, visitor) => {
|
|
354
|
+
if (value.internalAccessDetails !== undefined)
|
|
355
|
+
return visitor.internalAccessDetails(value.internalAccessDetails);
|
|
335
356
|
if (value.externalAccessDetails !== undefined)
|
|
336
357
|
return visitor.externalAccessDetails(value.externalAccessDetails);
|
|
337
358
|
if (value.unusedPermissionDetails !== undefined)
|
|
@@ -347,6 +368,7 @@ export var FindingDetails;
|
|
|
347
368
|
})(FindingDetails || (FindingDetails = {}));
|
|
348
369
|
export const FindingType = {
|
|
349
370
|
EXTERNAL_ACCESS: "ExternalAccess",
|
|
371
|
+
INTERNAL_ACCESS: "InternalAccess",
|
|
350
372
|
UNUSED_IAM_ROLE: "UnusedIAMRole",
|
|
351
373
|
UNUSED_IAM_USER_ACCESS_KEY: "UnusedIAMUserAccessKey",
|
|
352
374
|
UNUSED_IAM_USER_PASSWORD: "UnusedIAMUserPassword",
|
|
@@ -1348,6 +1348,11 @@ const de_FindingDetails = (output, context) => {
|
|
|
1348
1348
|
externalAccessDetails: _json(output.externalAccessDetails),
|
|
1349
1349
|
};
|
|
1350
1350
|
}
|
|
1351
|
+
if (output.internalAccessDetails != null) {
|
|
1352
|
+
return {
|
|
1353
|
+
internalAccessDetails: _json(output.internalAccessDetails),
|
|
1354
|
+
};
|
|
1355
|
+
}
|
|
1351
1356
|
if (output.unusedIamRoleDetails != null) {
|
|
1352
1357
|
return {
|
|
1353
1358
|
unusedIamRoleDetails: de_UnusedIamRoleDetails(output.unusedIamRoleDetails, context),
|
|
@@ -264,30 +264,7 @@ export interface AccessAnalyzer {
|
|
|
264
264
|
validatePolicy(args: ValidatePolicyCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: ValidatePolicyCommandOutput) => void): void;
|
|
265
265
|
}
|
|
266
266
|
/**
|
|
267
|
-
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
|
|
268
|
-
* a suite of capabilities. Its features include findings for external and unused access,
|
|
269
|
-
* basic and custom policy checks for validating policies, and policy generation to generate
|
|
270
|
-
* fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
|
|
271
|
-
* you first need to create an analyzer.</p>
|
|
272
|
-
* <p>
|
|
273
|
-
* <b>External access analyzers</b> help identify potential risks
|
|
274
|
-
* of accessing resources by enabling you to identify any resource policies that grant access
|
|
275
|
-
* to an external principal. It does this by using logic-based reasoning to analyze
|
|
276
|
-
* resource-based policies in your Amazon Web Services environment. An external principal can be another
|
|
277
|
-
* Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
|
|
278
|
-
* anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
|
|
279
|
-
* to your resources before deploying permissions changes.</p>
|
|
280
|
-
* <p>
|
|
281
|
-
* <b>Unused access analyzers</b> help identify potential
|
|
282
|
-
* identity access risks by enabling you to identify unused IAM roles, unused access keys,
|
|
283
|
-
* unused console passwords, and IAM principals with unused service and action-level
|
|
284
|
-
* permissions.</p>
|
|
285
|
-
* <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
|
|
286
|
-
* policies before deploying permissions changes. You can use policy generation to refine
|
|
287
|
-
* permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
|
|
288
|
-
* <p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
|
|
289
|
-
* For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
|
|
290
|
-
* <b>IAM User Guide</b>.</p>
|
|
267
|
+
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
|
|
291
268
|
* @public
|
|
292
269
|
*/
|
|
293
270
|
export declare class AccessAnalyzer extends AccessAnalyzerClient implements AccessAnalyzer {
|
|
@@ -206,30 +206,7 @@ export type AccessAnalyzerClientResolvedConfigType = __SmithyResolvedConfigurati
|
|
|
206
206
|
export interface AccessAnalyzerClientResolvedConfig extends AccessAnalyzerClientResolvedConfigType {
|
|
207
207
|
}
|
|
208
208
|
/**
|
|
209
|
-
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
|
|
210
|
-
* a suite of capabilities. Its features include findings for external and unused access,
|
|
211
|
-
* basic and custom policy checks for validating policies, and policy generation to generate
|
|
212
|
-
* fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
|
|
213
|
-
* you first need to create an analyzer.</p>
|
|
214
|
-
* <p>
|
|
215
|
-
* <b>External access analyzers</b> help identify potential risks
|
|
216
|
-
* of accessing resources by enabling you to identify any resource policies that grant access
|
|
217
|
-
* to an external principal. It does this by using logic-based reasoning to analyze
|
|
218
|
-
* resource-based policies in your Amazon Web Services environment. An external principal can be another
|
|
219
|
-
* Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
|
|
220
|
-
* anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
|
|
221
|
-
* to your resources before deploying permissions changes.</p>
|
|
222
|
-
* <p>
|
|
223
|
-
* <b>Unused access analyzers</b> help identify potential
|
|
224
|
-
* identity access risks by enabling you to identify unused IAM roles, unused access keys,
|
|
225
|
-
* unused console passwords, and IAM principals with unused service and action-level
|
|
226
|
-
* permissions.</p>
|
|
227
|
-
* <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
|
|
228
|
-
* policies before deploying permissions changes. You can use policy generation to refine
|
|
229
|
-
* permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
|
|
230
|
-
* <p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
|
|
231
|
-
* For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
|
|
232
|
-
* <b>IAM User Guide</b>.</p>
|
|
209
|
+
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
|
|
233
210
|
* @public
|
|
234
211
|
*/
|
|
235
212
|
export declare class AccessAnalyzerClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, AccessAnalyzerClientResolvedConfig> {
|
|
@@ -27,8 +27,7 @@ declare const ApplyArchiveRuleCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retroactively applies the archive rule to existing findings that meet the archive rule
|
|
31
|
-
* criteria.</p>
|
|
30
|
+
* <p>Retroactively applies the archive rule to existing findings that meet the archive rule criteria.</p>
|
|
32
31
|
* @example
|
|
33
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
33
|
* ```javascript
|
|
@@ -27,12 +27,7 @@ declare const CheckNoNewAccessCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Checks whether new access is allowed for an updated policy when compared to the existing
|
|
31
|
-
* policy.</p>
|
|
32
|
-
* <p>You can find examples for reference policies and learn how to set up and run a custom
|
|
33
|
-
* policy check for new access in the <a href="https://github.com/aws-samples/iam-access-analyzer-custom-policy-check-samples">IAM Access Analyzer custom policy checks samples</a> repository on GitHub. The reference
|
|
34
|
-
* policies in this repository are meant to be passed to the
|
|
35
|
-
* <code>existingPolicyDocument</code> request parameter.</p>
|
|
30
|
+
* <p>Checks whether new access is allowed for an updated policy when compared to the existing policy.</p> <p>You can find examples for reference policies and learn how to set up and run a custom policy check for new access in the <a href="https://github.com/aws-samples/iam-access-analyzer-custom-policy-check-samples">IAM Access Analyzer custom policy checks samples</a> repository on GitHub. The reference policies in this repository are meant to be passed to the <code>existingPolicyDocument</code> request parameter.</p>
|
|
36
31
|
* @example
|
|
37
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
38
33
|
* ```javascript
|
|
@@ -27,8 +27,7 @@ declare const CheckNoPublicAccessCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Checks whether a resource policy can grant public access to the specified resource
|
|
31
|
-
* type.</p>
|
|
30
|
+
* <p>Checks whether a resource policy can grant public access to the specified resource type.</p>
|
|
32
31
|
* @example
|
|
33
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
33
|
* ```javascript
|
|
@@ -27,8 +27,7 @@ declare const CreateAccessPreviewCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
|
|
31
|
-
* resource before deploying resource permissions.</p>
|
|
30
|
+
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your resource before deploying resource permissions.</p>
|
|
32
31
|
* @example
|
|
33
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
33
|
* ```javascript
|
|
@@ -78,6 +78,23 @@ declare const CreateAnalyzerCommand_base: {
|
|
|
78
78
|
* ],
|
|
79
79
|
* },
|
|
80
80
|
* },
|
|
81
|
+
* internalAccess: { // InternalAccessConfiguration
|
|
82
|
+
* analysisRule: { // InternalAccessAnalysisRule
|
|
83
|
+
* inclusions: [ // InternalAccessAnalysisRuleCriteriaList
|
|
84
|
+
* { // InternalAccessAnalysisRuleCriteria
|
|
85
|
+
* accountIds: [
|
|
86
|
+
* "STRING_VALUE",
|
|
87
|
+
* ],
|
|
88
|
+
* resourceTypes: [ // ResourceTypeList
|
|
89
|
+
* "STRING_VALUE",
|
|
90
|
+
* ],
|
|
91
|
+
* resourceArns: [ // ResourceArnsList
|
|
92
|
+
* "STRING_VALUE",
|
|
93
|
+
* ],
|
|
94
|
+
* },
|
|
95
|
+
* ],
|
|
96
|
+
* },
|
|
97
|
+
* },
|
|
81
98
|
* },
|
|
82
99
|
* };
|
|
83
100
|
* const command = new CreateAnalyzerCommand(input);
|
|
@@ -27,9 +27,7 @@ declare const CreateArchiveRuleCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
|
|
31
|
-
* new findings that meet the criteria you define when you create the rule.</p>
|
|
32
|
-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
30
|
+
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p> <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
33
31
|
* @example
|
|
34
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
35
33
|
* ```javascript
|
|
@@ -27,9 +27,7 @@ declare const DeleteAnalyzerCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
|
|
31
|
-
* for the account or organization in the current or specific Region. All findings that were
|
|
32
|
-
* generated by the analyzer are deleted. You cannot undo this action.</p>
|
|
30
|
+
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled for the account or organization in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.</p>
|
|
33
31
|
* @example
|
|
34
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
35
33
|
* ```javascript
|
|
@@ -72,6 +72,23 @@ declare const GetAnalyzerCommand_base: {
|
|
|
72
72
|
* // ],
|
|
73
73
|
* // },
|
|
74
74
|
* // },
|
|
75
|
+
* // internalAccess: { // InternalAccessConfiguration
|
|
76
|
+
* // analysisRule: { // InternalAccessAnalysisRule
|
|
77
|
+
* // inclusions: [ // InternalAccessAnalysisRuleCriteriaList
|
|
78
|
+
* // { // InternalAccessAnalysisRuleCriteria
|
|
79
|
+
* // accountIds: [
|
|
80
|
+
* // "STRING_VALUE",
|
|
81
|
+
* // ],
|
|
82
|
+
* // resourceTypes: [ // ResourceTypeList
|
|
83
|
+
* // "STRING_VALUE",
|
|
84
|
+
* // ],
|
|
85
|
+
* // resourceArns: [ // ResourceArnsList
|
|
86
|
+
* // "STRING_VALUE",
|
|
87
|
+
* // ],
|
|
88
|
+
* // },
|
|
89
|
+
* // ],
|
|
90
|
+
* // },
|
|
91
|
+
* // },
|
|
75
92
|
* // },
|
|
76
93
|
* // },
|
|
77
94
|
* // };
|
|
@@ -27,8 +27,7 @@ declare const GetArchiveRuleCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves information about an archive rule.</p>
|
|
31
|
-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
30
|
+
* <p>Retrieves information about an archive rule.</p> <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
32
31
|
* @example
|
|
33
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
33
|
* ```javascript
|
|
@@ -27,10 +27,7 @@ declare const GetFindingCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves information about the specified finding. GetFinding and GetFindingV2 both use
|
|
31
|
-
* <code>access-analyzer:GetFinding</code> in the <code>Action</code> element of an IAM
|
|
32
|
-
* policy statement. You must have permission to perform the
|
|
33
|
-
* <code>access-analyzer:GetFinding</code> action.</p>
|
|
30
|
+
* <p>Retrieves information about the specified finding. GetFinding and GetFindingV2 both use <code>access-analyzer:GetFinding</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:GetFinding</code> action.</p>
|
|
34
31
|
* @example
|
|
35
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
36
33
|
* ```javascript
|
|
@@ -27,10 +27,7 @@ declare const GetFindingV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves information about the specified finding. GetFinding and GetFindingV2 both use
|
|
31
|
-
* <code>access-analyzer:GetFinding</code> in the <code>Action</code> element of an IAM
|
|
32
|
-
* policy statement. You must have permission to perform the
|
|
33
|
-
* <code>access-analyzer:GetFinding</code> action.</p>
|
|
30
|
+
* <p>Retrieves information about the specified finding. GetFinding and GetFindingV2 both use <code>access-analyzer:GetFinding</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:GetFinding</code> action.</p>
|
|
34
31
|
* @example
|
|
35
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
36
33
|
* ```javascript
|
|
@@ -58,17 +55,19 @@ declare const GetFindingV2Command_base: {
|
|
|
58
55
|
* // updatedAt: new Date("TIMESTAMP"), // required
|
|
59
56
|
* // findingDetails: [ // FindingDetailsList // required
|
|
60
57
|
* // { // FindingDetails Union: only one key present
|
|
61
|
-
* //
|
|
58
|
+
* // internalAccessDetails: { // InternalAccessDetails
|
|
62
59
|
* // action: [ // ActionList
|
|
63
60
|
* // "STRING_VALUE",
|
|
64
61
|
* // ],
|
|
65
|
-
* // condition: { // ConditionKeyMap
|
|
62
|
+
* // condition: { // ConditionKeyMap
|
|
66
63
|
* // "<keys>": "STRING_VALUE",
|
|
67
64
|
* // },
|
|
68
|
-
* // isPublic: true || false,
|
|
69
65
|
* // principal: { // PrincipalMap
|
|
70
66
|
* // "<keys>": "STRING_VALUE",
|
|
71
67
|
* // },
|
|
68
|
+
* // principalOwnerAccount: "STRING_VALUE",
|
|
69
|
+
* // accessType: "STRING_VALUE",
|
|
70
|
+
* // principalType: "STRING_VALUE",
|
|
72
71
|
* // sources: [ // FindingSourceList
|
|
73
72
|
* // { // FindingSource
|
|
74
73
|
* // type: "STRING_VALUE", // required
|
|
@@ -79,6 +78,29 @@ declare const GetFindingV2Command_base: {
|
|
|
79
78
|
* // },
|
|
80
79
|
* // ],
|
|
81
80
|
* // resourceControlPolicyRestriction: "STRING_VALUE",
|
|
81
|
+
* // serviceControlPolicyRestriction: "STRING_VALUE",
|
|
82
|
+
* // },
|
|
83
|
+
* // externalAccessDetails: { // ExternalAccessDetails
|
|
84
|
+
* // action: [
|
|
85
|
+
* // "STRING_VALUE",
|
|
86
|
+
* // ],
|
|
87
|
+
* // condition: { // required
|
|
88
|
+
* // "<keys>": "STRING_VALUE",
|
|
89
|
+
* // },
|
|
90
|
+
* // isPublic: true || false,
|
|
91
|
+
* // principal: {
|
|
92
|
+
* // "<keys>": "STRING_VALUE",
|
|
93
|
+
* // },
|
|
94
|
+
* // sources: [
|
|
95
|
+
* // {
|
|
96
|
+
* // type: "STRING_VALUE", // required
|
|
97
|
+
* // detail: {
|
|
98
|
+
* // accessPointArn: "STRING_VALUE",
|
|
99
|
+
* // accessPointAccount: "STRING_VALUE",
|
|
100
|
+
* // },
|
|
101
|
+
* // },
|
|
102
|
+
* // ],
|
|
103
|
+
* // resourceControlPolicyRestriction: "STRING_VALUE",
|
|
82
104
|
* // },
|
|
83
105
|
* // unusedPermissionDetails: { // UnusedPermissionDetails
|
|
84
106
|
* // actions: [ // UnusedActionList
|
|
@@ -27,8 +27,7 @@ declare const GetFindingsStatisticsCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves a list of aggregated finding statistics for an external access or unused
|
|
31
|
-
* access analyzer.</p>
|
|
30
|
+
* <p>Retrieves a list of aggregated finding statistics for an external access or unused access analyzer.</p>
|
|
32
31
|
* @example
|
|
33
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
33
|
* ```javascript
|
|
@@ -54,6 +53,18 @@ declare const GetFindingsStatisticsCommand_base: {
|
|
|
54
53
|
* // totalArchivedFindings: Number("int"),
|
|
55
54
|
* // totalResolvedFindings: Number("int"),
|
|
56
55
|
* // },
|
|
56
|
+
* // internalAccessFindingsStatistics: { // InternalAccessFindingsStatistics
|
|
57
|
+
* // resourceTypeStatistics: { // InternalAccessResourceTypeStatisticsMap
|
|
58
|
+
* // "<keys>": { // InternalAccessResourceTypeDetails
|
|
59
|
+
* // totalActiveFindings: Number("int"),
|
|
60
|
+
* // totalResolvedFindings: Number("int"),
|
|
61
|
+
* // totalArchivedFindings: Number("int"),
|
|
62
|
+
* // },
|
|
63
|
+
* // },
|
|
64
|
+
* // totalActiveFindings: Number("int"),
|
|
65
|
+
* // totalArchivedFindings: Number("int"),
|
|
66
|
+
* // totalResolvedFindings: Number("int"),
|
|
67
|
+
* // },
|
|
57
68
|
* // unusedAccessFindingsStatistics: { // UnusedAccessFindingsStatistics
|
|
58
69
|
* // unusedAccessTypeStatistics: [ // UnusedAccessTypeStatisticsList
|
|
59
70
|
* // { // UnusedAccessTypeStatistics
|
|
@@ -27,8 +27,7 @@ declare const GetGeneratedPolicyCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves the policy that was generated using <code>StartPolicyGeneration</code>.
|
|
31
|
-
* </p>
|
|
30
|
+
* <p>Retrieves the policy that was generated using <code>StartPolicyGeneration</code>. </p>
|
|
32
31
|
* @example
|
|
33
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
33
|
* ```javascript
|
|
@@ -27,8 +27,7 @@ declare const ListAccessPreviewFindingsCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves a list of access preview findings generated by the specified access
|
|
31
|
-
* preview.</p>
|
|
30
|
+
* <p>Retrieves a list of access preview findings generated by the specified access preview.</p>
|
|
32
31
|
* @example
|
|
33
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
33
|
* ```javascript
|
|
@@ -27,8 +27,7 @@ declare const ListAnalyzedResourcesCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves a list of resources of the specified type that have been analyzed by the
|
|
31
|
-
* specified analyzer.</p>
|
|
30
|
+
* <p>Retrieves a list of resources of the specified type that have been analyzed by the specified analyzer.</p>
|
|
32
31
|
* @example
|
|
33
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
33
|
* ```javascript
|
|
@@ -75,6 +75,23 @@ declare const ListAnalyzersCommand_base: {
|
|
|
75
75
|
* // ],
|
|
76
76
|
* // },
|
|
77
77
|
* // },
|
|
78
|
+
* // internalAccess: { // InternalAccessConfiguration
|
|
79
|
+
* // analysisRule: { // InternalAccessAnalysisRule
|
|
80
|
+
* // inclusions: [ // InternalAccessAnalysisRuleCriteriaList
|
|
81
|
+
* // { // InternalAccessAnalysisRuleCriteria
|
|
82
|
+
* // accountIds: [
|
|
83
|
+
* // "STRING_VALUE",
|
|
84
|
+
* // ],
|
|
85
|
+
* // resourceTypes: [ // ResourceTypeList
|
|
86
|
+
* // "STRING_VALUE",
|
|
87
|
+
* // ],
|
|
88
|
+
* // resourceArns: [ // ResourceArnsList
|
|
89
|
+
* // "STRING_VALUE",
|
|
90
|
+
* // ],
|
|
91
|
+
* // },
|
|
92
|
+
* // ],
|
|
93
|
+
* // },
|
|
94
|
+
* // },
|
|
78
95
|
* // },
|
|
79
96
|
* // },
|
|
80
97
|
* // ],
|
|
@@ -27,11 +27,7 @@ declare const ListFindingsCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves a list of findings generated by the specified analyzer. ListFindings and
|
|
31
|
-
* ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the
|
|
32
|
-
* <code>Action</code> element of an IAM policy statement. You must have permission to
|
|
33
|
-
* perform the <code>access-analyzer:ListFindings</code> action.</p>
|
|
34
|
-
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
30
|
+
* <p>Retrieves a list of findings generated by the specified analyzer. ListFindings and ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:ListFindings</code> action.</p> <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
35
31
|
* @example
|
|
36
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
37
33
|
* ```javascript
|
|
@@ -27,11 +27,7 @@ declare const ListFindingsV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves a list of findings generated by the specified analyzer. ListFindings and
|
|
31
|
-
* ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the
|
|
32
|
-
* <code>Action</code> element of an IAM policy statement. You must have permission to
|
|
33
|
-
* perform the <code>access-analyzer:ListFindings</code> action.</p>
|
|
34
|
-
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
30
|
+
* <p>Retrieves a list of findings generated by the specified analyzer. ListFindings and ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:ListFindings</code> action.</p> <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
35
31
|
* @example
|
|
36
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
37
33
|
* ```javascript
|