Checks/Aws/Test-IamPolicyAllowsPrivilegeEscalation.ps1
|
function Test-IamPolicyAllowsPrivilegeEscalation { <# .SYNOPSIS Customer managed IAM policy does not allow actions that can lead to privilege escalation .DESCRIPTION **Customer-managed IAM policies** are evaluated for **permissions that enable privilege escalation**, including creating or updating policies, altering role trust, attaching higher-privilege policies, or using `iam:PassRole` to obtain broader access. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: iam_policy_allows_privilege_escalation [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check iam_policy_allows_privilege_escalation for reference.', 'N/A', 'iam Resources') } |