standard
turbot/aws_compliance

Pipeline: Test detect and correct IAM roles attached with *:* policy

Test detect and correct IAM roles attached with *:* policy pipeline.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_policy_star_star_attached_detach_role_star_star_policy

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_policy_star_star_attached_detach_role_star_star_policy
}

Params

NameTypeRequiredDescriptionDefault
conn
connection.aws
YesName of the AWS connection to be used for any authenticated actions.connection.aws.default
role_name
string
YesThe name of the role.flowpipe-role-452288b7-07d5-f8ed-8afe-eb411a3f4c33
policy_name
string
YesThe name of the policy.flowpipe-policy-c98e1812-5b70-9da9-3be5-334395ee33db
policy_document
string
YesThe policy document.{"Statement":[{"Action":"*","Effect":"Allow","Resource":"*","Sid":"AllowAllActionsAllResources"}],"Version":"2012-10-17"}
assume_role_policy_document
string
YesThe assume role policy document.{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"cloudtrail.amazonaws.com"}}],"Version":"2012-10-17"}

Outputs

NameDescription
test_resultsTest results for each step.

Tags

folder = Tests