standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Test detect and correct IAM roles attached with *:* policy
Test detect and correct IAM roles attached with *:* policy pipeline.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_policy_star_star_attached_detach_role_star_star_policy
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_policy_star_star_attached_detach_role_star_star_policy }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | connection.aws.default |
role_name | string | Yes | The name of the role. | flowpipe-role-452288b7-07d5-f8ed-8afe-eb411a3f4c33 |
policy_name | string | Yes | The name of the policy. | flowpipe-policy-c98e1812-5b70-9da9-3be5-334395ee33db |
policy_document | string | Yes | The policy document. | {"Statement":[{"Action":"*","Effect":"Allow","Resource":"*","Sid":"AllowAllActionsAllResources"}],"Version":"2012-10-17"} |
assume_role_policy_document | string | Yes | The assume role policy document. | {"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"cloudtrail.amazonaws.com"}}],"Version":"2012-10-17"} |
Outputs
Name | Description |
---|---|
test_results | Test results for each step. |
Tags
folder = Tests