File: doc.go

package info (click to toggle)
golang-github-aws-aws-sdk-go-v2 1.30.3-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 662,428 kB
  • sloc: java: 16,875; makefile: 432; sh: 175
file content (36 lines) | stat: -rw-r--r-- 2,154 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
// Code generated by smithy-go-codegen DO NOT EDIT.

// Package accessanalyzer provides the API client, operations, and parameter types
// for Access Analyzer.
//
// Identity and Access Management Access Analyzer helps you to set, verify, and
// refine your IAM policies by providing a suite of capabilities. Its features
// include findings for external and unused access, basic and custom policy checks
// for validating policies, and policy generation to generate fine-grained
// policies. To start using IAM Access Analyzer to identify external or unused
// access, you first need to create an analyzer.
//
// External access analyzers help identify potential risks of accessing resources
// by enabling you to identify any resource policies that grant access to an
// external principal. It does this by using logic-based reasoning to analyze
// resource-based policies in your Amazon Web Services environment. An external
// principal can be another Amazon Web Services account, a root user, an IAM user
// or role, a federated user, an Amazon Web Services service, or an anonymous user.
// You can also use IAM Access Analyzer to preview public and cross-account access
// to your resources before deploying permissions changes.
//
// Unused access analyzers help identify potential identity access risks by
// enabling you to identify unused IAM roles, unused access keys, unused console
// passwords, and IAM principals with unused service and action-level permissions.
//
// Beyond findings, IAM Access Analyzer provides basic and custom policy checks to
// validate IAM policies before deploying permissions changes. You can use policy
// generation to refine permissions by attaching a policy generated using access
// activity logged in CloudTrail logs.
//
// This guide describes the IAM Access Analyzer operations that you can call
// programmatically. For general information about IAM Access Analyzer, see [Identity and Access Management Access Analyzer]in the
// IAM User Guide.
//
// [Identity and Access Management Access Analyzer]: https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html
package accessanalyzer