standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Correct one IAM role attached with *:* policy
Runs corrective action to detach the *:* policy from a IAM role.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.correct_one_iam_role_with_policy_star_star_attached \ --arg 'title=<string>' \ --arg 'role_name=<string>' \ --arg 'policy_arn=<string>' \ --arg 'account_id=<string>' \ --arg 'conn=<connection.aws>'
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.correct_one_iam_role_with_policy_star_star_attached args = { title = <string> role_name = <string> policy_arn = <string> account_id = <string> conn = <connection.aws> }}
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
title | string | Yes | Title of the resource, to be used as a display name. | - |
role_name | string | Yes | The name of the IAM role. | - |
policy_arn | string | Yes | The ARN of the policy to be detached. | - |
account_id | string | Yes | The account ID of the AWS account. | - |
conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | - |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. | info |
approvers | list(notifier) | Yes | List of notifiers to be used for obtaining action/approval decisions. | notifier.default |
default_action | string | Yes | The default action to use when there are no approvers. | notify |
enabled_actions | list(string) | Yes | The list of enabled actions approvers can select. |
|
Outputs
This pipeline has no outputs.
Tags
category = Compliance
folder = Internal
mod = aws
service = AWS/IAM