standard
turbot/aws_compliance

Pipeline: Test detect and correct IAM roles attached with *:* policy

Test detect and correct IAM roles attached with *:* policy pipeline.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_policy_star_star_attached_detach_role_star_star_policy

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_policy_star_star_attached_detach_role_star_star_policy
}

Params

NameTypeRequiredDescriptionDefault
conn
connection.aws
YesName of the AWS connection to be used for any authenticated actions.connection.aws.default
role_name
string
YesThe name of the role.flowpipe-role-d056b30d-9f3c-5a4c-cddc-5efd4093a63e
policy_name
string
YesThe name of the policy.flowpipe-policy-d1c39786-164e-9b92-6c55-03dafff9530e
policy_document
string
YesThe policy document.{"Statement":[{"Action":"*","Effect":"Allow","Resource":"*","Sid":"AllowAllActionsAllResources"}],"Version":"2012-10-17"}
assume_role_policy_document
string
YesThe assume role policy document.{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"cloudtrail.amazonaws.com"}}],"Version":"2012-10-17"}

Outputs

NameDescription
test_resultsTest results for each step.

Tags

folder = Tests