It's just an FYI. Though theoretically you can create an aws virtual mfa device through terraform but you can't enable it or assign it to a user.
...
For further actions, you may consider blocking this person and/or reporting abuse
Can you try running an AWS IAM analyzer run task from terraform and save the output to an S3 bucket for analysis on the arn:aws:iam::210987654321:mfa/BobsMFADevice policy.
If I have understood you, you are asking if it's possible to make an AWS IAM analyzer run task terraform program that will save the analyzer output to an s3 bucket. The output will be further used to analysis the access of arn:aws:iam::210987654321:mfa/BobsMFADevice device. Am I right ?
I'm not 100% sure about it. But you can have a look on github.com/aws-ia/terraform-aws-ru....
Exactly. I was thinking this could help debugging.