standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Test detect and correct IAM roles attached with unrestricted CloudShell full access policy
Test detect and correct IAM roles attached with unrestricted CloudShell full access pipeline.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_unrestricted_cloudshell_full_access_detach_role_cloudshell_full_access_policyUse this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_roles_with_unrestricted_cloudshell_full_access_detach_role_cloudshell_full_access_policy }Params
| Name | Type | Required | Description | Default |
|---|---|---|---|---|
| conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | connection.aws.default |
| role_name | string | Yes | The name of the role. | flowpipe-role-04e6bd62-2733-153b-fd05-7998414f1703 |
| assume_role_policy_document | string | Yes | The assume role policy document. | {"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"cloudtrail.amazonaws.com"}}],"Version":"2012-10-17"} |
Outputs
| Name | Description |
|---|---|
| test_results | Test results for each step. |
Tags
folder = Tests