standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Test detect and correct IAM users with IAM policy
Test detect and correct IAM users with IAM policy attached pipeline.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_users_with_iam_policy_attached_detach_iam_policyUse this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_users_with_iam_policy_attached_detach_iam_policy }Params
| Name | Type | Required | Description | Default |
|---|---|---|---|---|
| conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | connection.aws.default |
| user_name | string | Yes | The name of the user. | flowpipe-user-bab472e6-848c-42fc-6ff2-20923bd6a3fd |
| policy_name | string | Yes | The name of the policy. | flowpipe-policy-4b6a89f7-372c-62b4-2902-51db06379e07 |
| policy_document | string | Yes | The policy document. | {"Statement":[{"Action":["logs:CreateLogStream"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailCreateLogStream2014110"},{"Action":["logs:PutLogEvents"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailPutLogEvents20141101"}],"Version":"2012-10-17"} |
Outputs
| Name | Description |
|---|---|
| test_results | Test results for each step. |
Tags
folder = Tests