Checks/Aws/Test-IamNoCustomPolicyPermissiveRoleAssumption.ps1
|
function Test-IamNoCustomPolicyPermissiveRoleAssumption { <# .SYNOPSIS Custom IAM policy does not allow STS role assumption on wildcard resources .DESCRIPTION **Custom IAM policies** with `Allow` statements that grant `sts:AssumeRole` (or `sts:*`/`*`) to a wildcard `Resource`. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: iam_no_custom_policy_permissive_role_assumption [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check iam_no_custom_policy_permissive_role_assumption for reference.', 'N/A', 'iam Resources') } |