iam-no-inline-policy-check
Checks if the inline policy feature is not in use. The rule is NON_COMPLIANT if an AWS Identity and Access Management (IAM) user, IAM role or IAM group has any inline policy.
Identifier: IAM_NO_INLINE_POLICY_CHECK
Resource Types: AWS::IAM::User, AWS::IAM::Role, AWS::IAM::Group
Trigger type: Configuration changes
AWS Region: All supported AWS regions except US ISO West (Northern California), Asia Pacific (Jakarta), Middle East (UAE), Asia Pacific (Hyderabad), Asia Pacific (Osaka), Asia Pacific (Malaysia), Asia Pacific (Melbourne), Israel (Tel Aviv), Canada West (Calgary), Europe (Spain), Europe (Zurich) Region
Parameters:
- None
AWS CloudFormation template
To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.