Amazon Inspector - IAM Policy error

0

We have Amazon Inspector scanning whole AWS Account. Amazon Inspector uses service linked role and policy which we cannot edit and link it with Amazon Inspector. While Amazon Inspector is scanning the account, we are seeing below error in CloudTrail logs which triggers alarms configured on the CloudTrail.

User: arn:aws:sts::XXXXXXXXXXX:assumed-role/AWSServiceRoleForAmazonInspector2/MandoService-XXXXXXXX is not authorized to perform: elasticloadbalancing:DescribeTargetGroupAttributes because no identity-based policy allows the elasticloadbalancing:DescribeTargetGroupAttributes action

We have verified the IAM Policy attached with "AWSServiceRoleForAmazonInspector2" and it does not have permission "elasticloadbalancing:DescribeTargetGroupAttributes". Is there anyway to configure Amazon Inspector with service linked role with elasticloadbalancing:DescribeTargetGroupAttributes permission?

We have reached to Amazon Support, but they are redirecting to business/enterprise support. It seems Amazon Inspector Policy issue, but not sure how to get resolution from AWS for the same.

2개 답변
1

Amazon Inspector uses the service-linked role named AWSServiceRoleForAmazonInspector2. This service-linked role trusts the inspector2.amazonaws.com service to assume the role.

The permissions policy for the role, which is named AmazonInspector2ServiceRolePolicy, allows Amazon Inspector to perform several tasks, such us using select Elastic Load Balancing actions to preform network scans of EC2 instances that are part of Elastic Load Balancing target groups.

The role configured must include the following permissions policy.

 "Sid": "TirosPolicy",
  	"Effect": "Allow",
  	"Action": [
  		
  		"elasticloadbalancing:DescribeListeners",
  		"elasticloadbalancing:DescribeLoadBalancerAttributes",
  		"elasticloadbalancing:DescribeLoadBalancers",
  		"elasticloadbalancing:DescribeRules",
  		"elasticloadbalancing:DescribeTags",
  		"elasticloadbalancing:DescribeTargetGroups",
  		"elasticloadbalancing:DescribeTargetGroupAttributes",
  		"elasticloadbalancing:DescribeTargetHealth",

[REFERENCES]

profile pictureAWS
답변함 9달 전
profile pictureAWS
전문가
검토됨 9달 전
0
수락된 답변

Thanks for your help. Linked IAM Policy "AmazonInspector2ServiceRolePolicy" magically updated yesterday to Version 11 and has this permission. We will monitor CloudTrail logs for any further errors.

Amit
답변함 9달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠