File: doc.go

package info (click to toggle)
golang-github-aws-aws-sdk-go-v2 1.24.1-2~bpo12%2B1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-backports
  • size: 554,032 kB
  • sloc: java: 15,941; makefile: 419; sh: 175
file content (30 lines) | stat: -rw-r--r-- 2,087 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
// Code generated by smithy-go-codegen DO NOT EDIT.

// Package accessanalyzer provides the API client, operations, and parameter types
// for Access Analyzer.
//
// Identity and Access Management Access Analyzer helps you to set, verify, and
// refine your IAM policies by providing a suite of capabilities. Its features
// include findings for external and unused access, basic and custom policy checks
// for validating policies, and policy generation to generate fine-grained
// policies. To start using IAM Access Analyzer to identify external or unused
// access, you first need to create an analyzer. External access analyzers help
// identify potential risks of accessing resources by enabling you to identify any
// resource policies that grant access to an external principal. It does this by
// using logic-based reasoning to analyze resource-based policies in your Amazon
// Web Services environment. An external principal can be another Amazon Web
// Services account, a root user, an IAM user or role, a federated user, an Amazon
// Web Services service, or an anonymous user. You can also use IAM Access Analyzer
// to preview public and cross-account access to your resources before deploying
// permissions changes. Unused access analyzers help identify potential identity
// access risks by enabling you to identify unused IAM roles, unused access keys,
// unused console passwords, and IAM principals with unused service and
// action-level permissions. Beyond findings, IAM Access Analyzer provides basic
// and custom policy checks to validate IAM policies before deploying permissions
// changes. You can use policy generation to refine permissions by attaching a
// policy generated using access activity logged in CloudTrail logs. This guide
// describes the IAM Access Analyzer operations that you can call programmatically.
// For general information about IAM Access Analyzer, see Identity and Access
// Management Access Analyzer (https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html)
// in the IAM User Guide.
package accessanalyzer