standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Correct IAM root users last used in 90 days or more
Send notifications for IAM root users last used in 90 days or more.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.correct_iam_root_users_last_used_90_days \ --arg 'items=<list(object({ title = string password_last_used = string access_key_1_last_used_date = string access_key_2_last_used_date = string conn = string }))>'
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.correct_iam_root_users_last_used_90_days args = { items = <list(object({ title = string password_last_used = string access_key_1_last_used_date = string access_key_2_last_used_date = string conn = string }))> }}
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
items | list(object({ title = string password_last_used = string access_key_1_last_used_date = string access_key_2_last_used_date = string conn = string })) | Yes | A collection of detected resources to run corrective actions against. | - |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. | info |
Outputs
This pipeline has no outputs.
Tags
category = Compliance
folder = Internal
mod = aws
service = AWS/IAM