Logs when the policy is denying access?

0

Related to https://repost.aws/questions/QUukCQO7PLQceXJiDRjqxBbg/iam-resources-requires-region-and-account-id I had an incorrect policy that was accidentally denyting access to write to cloudwatch logs.

I could not see any indication that my policy was wrong or (failed) attempted accesses from Access Advisor. Is that to be expected?

Or is there some way to detect these security events in Cloudtrail?

1回答
0

Hi hendry,

You can see Deny events in CloudTrail. In the this document you can see the different ways to troubleshoot IAM permission problems, including a AWS CLI command to filter these events from AWS CloudTrail.

AWS
回答済み 1年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ