iam-no-inline-policy-check - AWS Config

iam-no-inline-policy-check

Checks if the inline policy feature is not in use. The rule is NON_COMPLIANT if an AWS Identity and Access Management (IAM) user, IAM role or IAM group has any inline policy.

Identifier: IAM_NO_INLINE_POLICY_CHECK

Resource Types: AWS::IAM::User, AWS::IAM::Role, AWS::IAM::Group

Trigger type: Configuration changes

AWS Region: All supported AWS regions except US ISO West (Northern California), Asia Pacific (Jakarta), Middle East (UAE), Asia Pacific (Hyderabad), Asia Pacific (Osaka), Asia Pacific (Malaysia), Asia Pacific (Melbourne), Israel (Tel Aviv), Canada West (Calgary), Europe (Spain), Europe (Zurich) Region

Parameters:

None

AWS CloudFormation template

To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.