standard
turbot/aws_compliance

Pipeline: Test detect and correct IAM users with inline policies

Test detect and correct IAM users with inline policies attached pipeline.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_users_with_inline_policy_attached_delete_inline_policy

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_users_with_inline_policy_attached_delete_inline_policy
}

Params

NameTypeRequiredDescriptionDefault
conn
connection.aws
YesName of the AWS connection to be used for any authenticated actions.connection.aws.default
user_name
string
YesThe name of the user.flowpipe-user-ac58b0e2-f2ca-32b8-4200-1f03e27b6295
policy_name
string
YesThe name of the inline policy.flowpipe-policy-2a075a8f-0169-e668-acf2-50bff73a8075
policy_document
string
YesThe policy document.{"Statement":[{"Action":["logs:CreateLogStream"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailCreateLogStream2014110"},{"Action":["logs:PutLogEvents"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailPutLogEvents20141101"}],"Version":"2012-10-17"}

Outputs

NameDescription
test_resultsTest results for each step.

Tags

folder = Tests