standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Correct one IAM account password policy without password reuse 24
Runs corrective action for an IAM account password policy that do not enforce a password reuse prevention policy of 24.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.correct_one_iam_account_password_policy_without_password_reuse_24 \ --arg 'title=<string>' \ --arg 'account_id=<string>' \ --arg 'conn=<connection.aws>'
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.correct_one_iam_account_password_policy_without_password_reuse_24 args = { title = <string> account_id = <string> conn = <connection.aws> }}
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
title | string | Yes | Title of the resource, to be used as a display name. | - |
account_id | string | Yes | The account ID of the AWS account. | - |
conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | - |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. | info |
approvers | list(notifier) | Yes | List of notifiers to be used for obtaining action/approval decisions. | notifier.default |
default_action | string notify , skip , update_password_policy_reuse_prevention | Yes | The default action to use when there are no approvers. | notify |
enabled_actions | list(string) skip , update_password_policy_reuse_prevention | Yes | The list of enabled actions approvers can select. |
|
Outputs
This pipeline has no outputs.
Tags
category = Compliance
folder = Internal
mod = aws
service = AWS/IAM