Note that if a caller has been granted access permissions to all keys
(through, for example, IAM user policies that grant Decrypt permission
on all resources), then ciphertext encrypted by using keys in other
accounts where the key grants access to the caller can be decrypted. To
remedy this, we recommend that you do not grant Decrypt access in an
IAM user policy. Instead grant Decrypt access only in key policies. If
you must grant Decrypt access in an IAM user policy, you should scope
the resource to specific keys or to specific trusted accounts.
The result of this operation varies with the key state of the CMK. For
details, see How Key State Affects Use of a Customer Master Key
in the AWS Key Management Service Developer Guide.