Checks/Aws/Test-IamCustomerUnattachedPolicyNoAdministrativePrivileges.ps1
|
function Test-IamCustomerUnattachedPolicyNoAdministrativePrivileges { <# .SYNOPSIS Unattached customer managed IAM policy does not allow '*:*' administrative privileges .DESCRIPTION **Customer-managed IAM policies** that are **unattached** are evaluated for statements granting **full administrative access** using `*:*` wildcards. The focus is on policies whose documents include unrestricted actions on all resources. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: iam_customer_unattached_policy_no_administrative_privileges [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check iam_customer_unattached_policy_no_administrative_privileges for reference.', 'N/A', 'iam Resources') } |