standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Detect & correct IAM root users last used in 90 days or more
Detect IAM root users last used in 90 days or more.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.detect_and_correct_iam_root_users_last_used_90_days
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.detect_and_correct_iam_root_users_last_used_90_days }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
database | connection.steampipe | Yes | Database connection string. | connection.steampipe.default |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. | info |
Outputs
This pipeline has no outputs.
Tags
category = Compliance
mod = aws
recommended = true
service = AWS/IAM