From 565edf7b4b79577d3b63ce787afdf5f8a560e58c Mon Sep 17 00:00:00 2001 From: Toni de la Fuente Date: Thu, 27 Aug 2020 16:21:56 +0200 Subject: [PATCH] Change check ID to extra7100 Change check ID to extra7100 --- checks/check_extra798 | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/checks/check_extra798 b/checks/check_extra798 index c3f54f1c..d032b159 100644 --- a/checks/check_extra798 +++ b/checks/check_extra798 @@ -13,14 +13,14 @@ # under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR # CONDITIONS OF ANY KIND, either express or implied. See the License for the # specific language governing permissions and limitations under the License. -CHECK_ID_extra798="7.98" -CHECK_TITLE_extra798="[extra798] Ensure that no custom policies exist which allow permissive role assumption (e.g. sts:AssumeRole on *)" -CHECK_SCORED_extra798="NOT_SCORED" -CHECK_TYPE_extra798="EXTRA" -CHECK_ASFF_RESOURCE_TYPE_extra798="AwsIamPolicy" -CHECK_ALTERNATE_extra798="extra798" +CHECK_ID_extra7100="7.100" +CHECK_TITLE_extra7100="[extra7100] Ensure that no custom policies exist which allow permissive role assumption (e.g. sts:AssumeRole on *)" +CHECK_SCORED_extra7100="NOT_SCORED" +CHECK_TYPE_extra7100="EXTRA" +CHECK_ASFF_RESOURCE_TYPE_extra7100="AwsIamPolicy" +CHECK_ALTERNATE_check7100="extra7100" -extra798(){ +extra7100(){ # "Ensure that no custom policies exist which permit assuming any role (e.g. sts:AssumeRole on *)" # # A permissive STS Role assumption policy is one where the Resource (ARN) is not explicitly defined