Checks/Aws/Test-IamInlinePolicyAllowsPrivilegeEscalation.ps1
|
function Test-IamInlinePolicyAllowsPrivilegeEscalation { <# .SYNOPSIS IAM inline policy does not allow privilege escalation .DESCRIPTION **IAM inline policies** are evaluated for permission combinations that enable **privilege escalation**, such as `sts:AssumeRole`, `iam:PassRole`, attaching/editing policies, or broad wildcards. The result highlights inline policies that allow a principal to obtain higher effective access. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: iam_inline_policy_allows_privilege_escalation [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check iam_inline_policy_allows_privilege_escalation for reference.', 'N/A', 'iam Resources') } |