Open
Description
Integrate IAM Access Analyzer policy validation with the CLI, either with a special command or during deploy
.
It could also be used as a new "linting" tool in the repo to ensure that IAM policies created by AWS CDK constructs comply with best practices.
See https://aws.amazon.com/blogs/aws/iam-access-analyzer-update-policy-validation/
See https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-policy-validation.html
Use Case
- Warn users if their CDK code generates "bad" IAM policies
- Ensure AWS CDK constructs deliver IAM policies that are compliant with best practices
Proposed Solution
To be discussed 😄
- 👋 I may be able to implement this feature request
-
⚠️ This feature might incur a breaking change
This is a 🚀 Feature Request