standard
turbot/aws_compliance

Pipeline: Detect & correct IAM accounts without support role

Detects IAM accounts without support role and then create a new support role.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run aws_compliance.pipeline.detect_and_correct_iam_accounts_without_support_role \
--arg 'user_arn=<string>'

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = aws_compliance.pipeline.detect_and_correct_iam_accounts_without_support_role
args = {
user_arn = <string>
}
}

Params

NameTypeRequiredDescriptionDefault
database
connection.steampipe
YesDatabase connection string.connection.steampipe.default
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
user_arn
string
YesSpecifies the IAM user to be used for creating the support role.-
support_role_name
string
YesSpecifies the IAM support role that will be created.flowpipe-aws-support-access
notification_level
string
verbose, info, error
YesThe verbosity level of notification messages to send.info
approvers
list(notifier)
YesList of notifiers to be used for obtaining action/approval decisions.notifier.default
default_action
string
notify, skip, create_support_role
YesThe default action to use when there are no approvers.notify
enabled_actions
list(string)
skip, create_support_role
YesThe list of enabled actions approvers can select.
[
"skip",
"create_support_role"
]

Outputs

This pipeline has no outputs.

Tags

category = Compliance
mod = aws
service = AWS/IAM