standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Test detect and correct IAM users with inline policies
Test detect and correct IAM users with inline policies attached pipeline.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_users_with_inline_policy_attached_delete_inline_policy
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_users_with_inline_policy_attached_delete_inline_policy }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | connection.aws.default |
user_name | string | Yes | The name of the user. | flowpipe-user-148a3441-8d3a-ea9f-5b73-97f0727db197 |
policy_name | string | Yes | The name of the inline policy. | flowpipe-policy-8f4d4894-fb54-f096-cf33-6373e5e794dd |
policy_document | string | Yes | The policy document. | {"Statement":[{"Action":["logs:CreateLogStream"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailCreateLogStream2014110"},{"Action":["logs:PutLogEvents"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailPutLogEvents20141101"}],"Version":"2012-10-17"} |
Outputs
Name | Description |
---|---|
test_results | Test results for each step. |
Tags
folder = Tests