{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Stmt1469200763880",
"Action": [
"iam:AttachRolePolicy",
"iam:CreateRole"
],
"Effect": "Allow",
"Resource": "*"
}
]
}
- Does Having a permission to create and attach permissions gives the entity power to do anything within an account, since it can attach improper roles to create any resource or perform any actions?
- If so, who should be responsible for that within an aws account?
- If so, it is as dangerous as using the root account, therefore, should I manage all permissions and then delete this policy?
- Are there more secure options?