Remediate: jenkins-worker-role
Select permissions to remove or modify based on least-privilege recommendations.
Impact Warning: Removing permissions may cause service interruptions if current activity wasn't captured in the 90-day window. We recommend using a staging environment first.
Select Actions
Annotation: Users can cherry-pick which security risks to address.
Detach 'AdministratorAccess'
This policy provides full access to all resources. It is highly over-privileged for this role.
+ Will be replaced by 'Scoped-Jenkins-Policy'
Remove Unused Service: KMS
KMS permissions haven't been used in 182 days.
Restrict S3 Access to specific bucket
Currently has access to all buckets (*). Recommendation: Restrict to 'prod-backups-01'.
Policy Preview (New)
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"ec2:DescribeInstances"
],
"Resource": "*"
}
]
}
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"ec2:DescribeInstances"
],
"Resource": "*"
}
]
}
Workflow Options
This action will be logged in the Audit Trail.
Audit Log Preview
User: admin_user
Action: IAM_POLICY_REDUCE
Target: jenkins-worker-role
Changes: 2 policies modified