Investigate and resolve overprivileged access
Use insights to quarantine, delete, or right-size permissions
After running an Access Discovery assessment and reviewing the results, you can investigate and remediate unused or excessive permissions identified across your environment.

Using the Recommendations tab, you can review the top overprivileged issues for each principal. Access Discovery provides guided remediation options such as quarantine, deletion, or right-sizing to help reduce unnecessary access.
Remediate overprivileged access
Follow these steps to remediate overprivileged access:
On the Access Discovery page, in the row of an assessment, click Explore. The View Assessment page opens.
In the table, click the row of a principal. The Principal Details panel opens and displays information about the principal.
Account
Account where the principal is stored
Risk Score
Calculation based on the Principal Risk Level (maximum score of policy actions sensitivity) and the account risk level
ARN
Amazon resource name of the principal
Identities
Number of human and machine identities
Last Used
Last use date of the principal
Over Privilege
Overall percentage of overprivileged permissions
Beside this value in parentheses is the overprivilege percentage for high-risk permissions (Admin, AIM).
Tiers
Calculation based on the Over Privilege percent, Risk Score, and Privilege Permissions percentage.
On the Recommendations tab, expand a recommendation category to view the suggested summary:
Dormant Principal Detected: Principals that have not been used within the past 90 days
Unused Privileged Permissions Detected: High-risk actions assigned to but not used by a principal
Overprivileged Policy Detected: Policy assigned to a principal that includes unused actions
Click How to Fix. A pop-up window appears.
Complete the fix based on the type of recommendation.
Used By
The Used By tab displays the human and machine identities that have used the principal.

This view helps you trace usage and validate whether access is still needed. You can expand the row of an identity to view the details of the Last 5 logins:
User Agent
Source IP
Date
Used For
The Used For tab displays the policies associated with the selected principal. Each policy summarizes the number of used and unused permissions, organized by privilege level.

Unused access at higher privilege levels (such as Admin or IAM) represents increased risk and should be prioritized for review to reduce risk.
Follow these steps to remediate a policy:
On the Used For tab, expand a policy.
Click Right-size. A pop-up window appears.
Quarantine or right-size the policy to reduce unnecessary access.
Last updated
Was this helpful?