Skip to content

Commit

Permalink
upd: update policy 058 to be supported by open source Cloud Custodian
Browse files Browse the repository at this point in the history
  • Loading branch information
anna-shcherbak committed Sep 23, 2024
1 parent 35cc402 commit 1a04e97
Show file tree
Hide file tree
Showing 13 changed files with 153 additions and 73 deletions.

This file was deleted.

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -11,5 +11,9 @@ policies:
Support role has not been created to manage incidents with AWS Support
resource: aws.account
filters:
- type: account-iam-role-light-filter
value: AWSSupportAccess
- type: missing
policy:
resource: aws.iam-role
filters:
- type: has-specific-managed-policy
value: AWSSupportAccess
Original file line number Diff line number Diff line change
Expand Up @@ -5,10 +5,11 @@
"Effect": "Allow",
"Action": [
"iam:ListRoles",
"iam:ListAttachedRolePolicies",
"iam:ListAccountAliases"
"iam:ListAccountAliases",
"iam:GetRole",
"iam:ListAttachedRolePolicies"
],
"Resource": "*"
}
]
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
{
"status_code": 200,
"data": {
"Role": {
"Path": "/",
"RoleName": "058_role_green",
"RoleId": "AROAXPHGII4ACAVF4JECQ",
"Arn": "arn:aws:iam::111111111111:role/058_role_green",
"CreateDate": {
"__class__": "datetime",
"year": 2024,
"month": 9,
"day": 23,
"hour": 18,
"minute": 49,
"second": 31,
"microsecond": 0
},
"AssumeRolePolicyDocument": "%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22cloudtrail.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D",
"MaxSessionDuration": 3600,
"Tags": [
{
"Key": "ComplianceStatus",
"Value": "Green"
}
],
"RoleLastUsed": {}
},
"ResponseMetadata": {}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"status_code": 200,
"data": {
"AccountAliases": [
"epmcsec-lab10"
"test"
],
"IsTruncated": false,
"ResponseMetadata": {}
Expand Down
Original file line number Diff line number Diff line change
@@ -1,27 +1,27 @@
{
"status_code": 200,
"data": {
"Roles": [
{
"Path": "/",
"RoleName": "058_role_green",
"RoleId": "AROAXPHGII4AIEXNYHONO",
"Arn": "arn:aws:iam::644160558196:role/058_role_green",
"CreateDate": {
"__class__": "datetime",
"year": 2022,
"month": 2,
"day": 15,
"hour": 8,
"minute": 10,
"second": 18,
"microsecond": 0
},
"AssumeRolePolicyDocument": "%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A513731479296%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D",
"MaxSessionDuration": 3600
}
],
"IsTruncated": false,
"ResponseMetadata": {}
}
{
"status_code": 200,
"data": {
"Roles": [
{
"Path": "/",
"RoleName": "058_role_green",
"RoleId": "AROAXPHGII4ACAVF4JECQ",
"Arn": "arn:aws:iam::111111111111:role/058_role_green",
"CreateDate": {
"__class__": "datetime",
"year": 2024,
"month": 9,
"day": 23,
"hour": 18,
"minute": 49,
"second": 31,
"microsecond": 0
},
"AssumeRolePolicyDocument": "%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22cloudtrail.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D",
"MaxSessionDuration": 3600
}
],
"IsTruncated": false,
"ResponseMetadata": {}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"status_code": 200,
"data": {
"Role": {
"Path": "/",
"RoleName": "058_role_red",
"RoleId": "AROAXPHGII4AMILI3XT3L",
"Arn": "arn:aws:iam::111111111111:role/058_role_red",
"CreateDate": {
"__class__": "datetime",
"year": 2024,
"month": 9,
"day": 23,
"hour": 18,
"minute": 53,
"second": 12,
"microsecond": 0
},
"AssumeRolePolicyDocument": "%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A876320341958%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D",
"MaxSessionDuration": 3600,
"Tags": [
{
"Key": "ComplianceStatus",
"Value": "Red"
},
{
"Key": "CustodianRule",
"Value": "ecc-aws-058-ensure_support_role_created_to_manage_incidents"
}
],
"RoleLastUsed": {}
},
"ResponseMetadata": {}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"status_code": 200,
"data": {
"AccountAliases": [
"epmcsec-lab10"
"test"
],
"IsTruncated": false,
"ResponseMetadata": {}
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
{
"status_code": 200,
"data": {
"AttachedPolicies": [
{
"PolicyName": "AmazonSSMManagedInstanceCore",
"PolicyArn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
},
{
"PolicyName": "AmazonSSMPatchAssociation",
"PolicyArn": "arn:aws:iam::aws:policy/AmazonSSMPatchAssociation"
}
],
"IsTruncated": false,
"ResponseMetadata": {}
}
}
Original file line number Diff line number Diff line change
@@ -1,27 +1,27 @@
{
"status_code": 200,
"data": {
"Roles": [
{
"Path": "/",
"RoleName": "058_role_red",
"RoleId": "AROAXPHGII4ACZPPSRNFM",
"Arn": "arn:aws:iam::644160558196:role/058_role_red",
"CreateDate": {
"__class__": "datetime",
"year": 2022,
"month": 2,
"day": 15,
"hour": 8,
"minute": 0,
"second": 7,
"microsecond": 0
},
"AssumeRolePolicyDocument": "%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A513731479296%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D",
"MaxSessionDuration": 3600
}
],
"IsTruncated": false,
"ResponseMetadata": {}
}
{
"status_code": 200,
"data": {
"Roles": [
{
"Path": "/",
"RoleName": "058_role_red",
"RoleId": "AROAXPHGII4AMILI3XT3L",
"Arn": "arn:aws:iam::111111111111:role/058_role_red",
"CreateDate": {
"__class__": "datetime",
"year": 2024,
"month": 9,
"day": 23,
"hour": 18,
"minute": 53,
"second": 12,
"microsecond": 0
},
"AssumeRolePolicyDocument": "%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A876320341958%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D",
"MaxSessionDuration": 3600
}
],
"IsTruncated": false,
"ResponseMetadata": {}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
class PolicyTest(object):

def test_resources_with_client(self, base_test, resources, local_session):
base_test.assertEqual(len(resources), 1)
iam = local_session.client("iam").list_attached_role_policies(RoleName = "058_role_red")
base_test.assertNotIn("arn:aws:iam::aws:policy/AWSSupportAccess" ,iam["AttachedPolicies"][0]["PolicyArn"])

0 comments on commit 1a04e97

Please sign in to comment.