Checking for AWS account permissions
Each account in N2WS is mapped to a specific Roles or IAM user in AWS.
You can see the list of account and authentication types in the Account Tab:
For each account, you can select it and then click on 'Check AWS Permissions'
This will test the permissions status for the account by category.
If they are fine it will be Green
if something is missing it will be red
What to do If permissions are missing?
You need to make sure you download the latest json policies from this KB Article.
Be aware that for some editions you have 3 json policy file, If there are 3 then you need them all.
- Link: Required minimal AWS permissions/roles for CPM operation
Can anything else impact permissions?
Yes, sometimes other AWS configuration might impact permissions,
For example AWS Organization SCP (Service Control Policies).
One useful tool is the AWS Policy Simulator which can help you test for permission:
- https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html