standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Test detect and correct IAM roles attached with *:* policy
Test detect and correct IAM roles attached with *:* policy pipeline.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_policy_star_star_attached_detach_role_star_star_policyUse this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_policy_star_star_attached_detach_role_star_star_policy }Params
| Name | Type | Required | Description | Default |
|---|---|---|---|---|
| conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | connection.aws.default |
| role_name | string | Yes | The name of the role. | flowpipe-role-d056b30d-9f3c-5a4c-cddc-5efd4093a63e |
| policy_name | string | Yes | The name of the policy. | flowpipe-policy-d1c39786-164e-9b92-6c55-03dafff9530e |
| policy_document | string | Yes | The policy document. | {"Statement":[{"Action":"*","Effect":"Allow","Resource":"*","Sid":"AllowAllActionsAllResources"}],"Version":"2012-10-17"} |
| assume_role_policy_document | string | Yes | The assume role policy document. | {"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"cloudtrail.amazonaws.com"}}],"Version":"2012-10-17"} |
Outputs
| Name | Description |
|---|---|
| test_results | Test results for each step. |
Tags
folder = Tests