standard
turbot/aws_compliance

Pipeline: Test detect and correct IAM users with inline policies

Test detect and correct IAM users with inline policies attached pipeline.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_users_with_inline_policy_attached_delete_inline_policy

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_users_with_inline_policy_attached_delete_inline_policy
}

Params

NameTypeRequiredDescriptionDefault
conn
connection.aws
YesName of the AWS connection to be used for any authenticated actions.connection.aws.default
user_name
string
YesThe name of the user.flowpipe-user-148a3441-8d3a-ea9f-5b73-97f0727db197
policy_name
string
YesThe name of the inline policy.flowpipe-policy-8f4d4894-fb54-f096-cf33-6373e5e794dd
policy_document
string
YesThe policy document.{"Statement":[{"Action":["logs:CreateLogStream"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailCreateLogStream2014110"},{"Action":["logs:PutLogEvents"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailPutLogEvents20141101"}],"Version":"2012-10-17"}

Outputs

NameDescription
test_resultsTest results for each step.

Tags

folder = Tests