Skip to content

Logs when the policy is denying access?

0

Related to https://repost.aws/questions/QUukCQO7PLQceXJiDRjqxBbg/iam-resources-requires-region-and-account-id I had an incorrect policy that was accidentally denyting access to write to cloudwatch logs.

I could not see any indication that my policy was wrong or (failed) attempted accesses from Access Advisor. Is that to be expected?

Or is there some way to detect these security events in Cloudtrail?

asked 3 years ago465 views
1 Answer
0

Hi hendry,

You can see Deny events in CloudTrail. In the this document you can see the different ways to troubleshoot IAM permission problems, including a AWS CLI command to filter these events from AWS CloudTrail.

AWS
answered 3 years ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.