standard
turbot/aws_compliance

Pipeline: Test detect and correct IAM users with IAM policy

Test detect and correct IAM users with IAM policy attached pipeline.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_users_with_iam_policy_attached_detach_iam_policy

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_users_with_iam_policy_attached_detach_iam_policy
}

Params

NameTypeRequiredDescriptionDefault
conn
connection.aws
YesName of the AWS connection to be used for any authenticated actions.connection.aws.default
user_name
string
YesThe name of the user.flowpipe-user-34760692-bb46-33ae-a928-3d3a490eda9d
policy_name
string
YesThe name of the policy.flowpipe-policy-b57b4b2b-dc65-4ab0-1a4c-0193f918f729
policy_document
string
YesThe policy document.{"Statement":[{"Action":["logs:CreateLogStream"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailCreateLogStream2014110"},{"Action":["logs:PutLogEvents"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailPutLogEvents20141101"}],"Version":"2012-10-17"}

Outputs

NameDescription
test_resultsTest results for each step.

Tags

folder = Tests