Checks/Aws/Test-IamSecurityauditRoleCreated.ps1
|
function Test-IamSecurityauditRoleCreated { <# .SYNOPSIS At least one IAM role has the SecurityAudit AWS managed policy attached .DESCRIPTION **IAM roles** with the AWS managed `SecurityAudit` policy (`arn:aws:iam::aws:policy/SecurityAudit`) are identified. The focus is on whether a role exists that grants read-only visibility into security-relevant configuration across AWS services. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: iam_securityaudit_role_created [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check iam_securityaudit_role_created for reference.', 'N/A', 'iam Resources') } |