fix(iam_inline_policy_no_administrative_privileges): set resource id as the entity name (#2820)

This commit is contained in:
Sergio Garcia
2023-09-22 12:59:10 +02:00
committed by GitHub
parent 87ddb6b171
commit 70fbf1676a
4 changed files with 15 additions and 7 deletions

View File

@@ -10,7 +10,7 @@ class iam_inline_policy_no_administrative_privileges(Check):
report = Check_Report_AWS(self.metadata())
report.region = iam_client.region
report.resource_arn = policy.arn
report.resource_id = policy.name
report.resource_id = policy.entity
report.resource_tags = policy.tags
report.status = "PASS"
report.status_extended = f"{policy.type} policy {policy.name} for IAM identity {policy.arn} does not allow '*:*' administrative privileges."

View File

@@ -398,6 +398,7 @@ class IAM(AWSService):
Policy(
name=policy,
arn=user.arn,
entity=user.name,
type="Inline",
attached=True,
version_id="v1",
@@ -438,6 +439,7 @@ class IAM(AWSService):
Policy(
name=policy,
arn=group.arn,
entity=group.name,
type="Inline",
attached=True,
version_id="v1",
@@ -478,6 +480,7 @@ class IAM(AWSService):
Policy(
name=policy,
arn=role.arn,
entity=role.name,
type="Inline",
attached=True,
version_id="v1",
@@ -536,6 +539,7 @@ class IAM(AWSService):
Policy(
name=policy["PolicyName"],
arn=policy["Arn"],
entity=policy["PolicyId"],
version_id=policy["DefaultVersionId"],
type="Custom" if scope == "Local" else "AWS",
attached=True
@@ -714,6 +718,7 @@ class Certificate(BaseModel):
class Policy(BaseModel):
name: str
arn: str
entity: str
version_id: str
type: str
attached: bool

View File

@@ -128,7 +128,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
assert len(results) == 1
assert results[0].region == AWS_REGION
assert results[0].resource_arn == group_arn
assert results[0].resource_id == policy_name
assert results[0].resource_id == group_name
assert results[0].resource_tags == []
assert results[0].status == "FAIL"
assert (
@@ -172,7 +172,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
assert len(results) == 1
assert results[0].region == AWS_REGION
assert results[0].resource_arn == group_arn
assert results[0].resource_id == policy_name
assert results[0].resource_id == group_name
assert results[0].resource_tags == []
assert results[0].status == "PASS"
assert (
@@ -316,7 +316,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
assert len(results) == 1
assert results[0].region == AWS_REGION
assert results[0].resource_arn == role_arn
assert results[0].resource_id == policy_name
assert results[0].resource_id == role_name
assert results[0].resource_tags == []
assert results[0].status == "FAIL"
assert (
@@ -363,7 +363,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
assert len(results) == 1
assert results[0].region == AWS_REGION
assert results[0].resource_arn == role_arn
assert results[0].resource_id == policy_name
assert results[0].resource_id == role_name
assert results[0].resource_tags == []
assert results[0].status == "PASS"
assert (
@@ -507,7 +507,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
assert len(results) == 1
assert results[0].region == AWS_REGION
assert results[0].resource_arn == user_arn
assert results[0].resource_id == policy_name
assert results[0].resource_id == user_name
assert results[0].resource_tags == []
assert results[0].status == "FAIL"
assert (
@@ -553,7 +553,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
assert len(results) == 1
assert results[0].region == AWS_REGION
assert results[0].resource_arn == user_arn
assert results[0].resource_id == policy_name
assert results[0].resource_id == user_name
assert results[0].resource_tags == []
assert results[0].status == "PASS"
assert (

View File

@@ -818,6 +818,7 @@ nTTxU4a7x1naFxzYXK1iQ1vMARKMjDb19QEJIEJKZlDK4uS7yMlf1nFS
type="Inline",
attached=True,
document=INLINE_POLICY_NOT_ADMIN,
entity=user_name,
)
# Test IAM Group Inline Policy
@@ -861,6 +862,7 @@ nTTxU4a7x1naFxzYXK1iQ1vMARKMjDb19QEJIEJKZlDK4uS7yMlf1nFS
type="Inline",
attached=True,
document=INLINE_POLICY_NOT_ADMIN,
entity=group_name,
)
# Test IAM Role Inline Policy
@@ -906,4 +908,5 @@ nTTxU4a7x1naFxzYXK1iQ1vMARKMjDb19QEJIEJKZlDK4uS7yMlf1nFS
type="Inline",
attached=True,
document=INLINE_POLICY_NOT_ADMIN,
entity=role_name,
)