-
Updated
Mar 28, 2022 - Python
iam
Here are 687 public repositories matching this topic...
-
Updated
Mar 22, 2022 - Shell
-
Updated
Apr 2, 2022 - Go
-
Updated
Apr 8, 2022 - Go
-
Updated
Apr 8, 2022 - Go
-
Updated
Apr 1, 2022 - Python
- There are still mentions of a triage worksheet. "Cloudsplaining identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet. It can scan all the policies in your AWS account or it can scan a single policy file." The worksheet is mentioned several times.
- As shown in the above, there is no mention of multiple AWS accounts
- The GIF st
-
Updated
Mar 7, 2022 - Go
-
Updated
Apr 7, 2022 - Python
-
Updated
Apr 4, 2022 - Rust
-
Updated
Jun 21, 2019 - TypeScript
-
Updated
Mar 31, 2022
-
Updated
Dec 7, 2021 - Shell
-
Updated
Jan 20, 2022
-
Updated
Mar 22, 2022 - Java
#22 introduced a feature to guess actions that are similar to an existing policy. It currently doesn't support all actions.
Here's things I currently know are missing (comment if you find more):
- KMS:
Encrypt,Decrypt,GenerateDataKey, ... - ECR:
BatchDeleteImage,BatchGetImage, ... -
*Deregister* -
*Modify* -
*Remove* - API Gateway: (
DELETE,
running airiam recommend_groups, in MAC gives this error
`INFO:botocore.credentials:Found credentials in shared credentials file: ~/.aws/credentials
Reusing local data
INFO:root:Analyzing data for account 051349106950
INFO:root:Using the default UserOrganizer
Traceback (most recent call last):
File "/usr/local/bin/airiam", line 5, in
run()
File "/usr/local/Cellar/airiam/
-
Updated
Dec 19, 2021 - Java
Usually, we probably want to copy the output of the conversion back into our IDE. Explore what we can do to make this easier.
One idea would be to use the toolbar and copy-to-clipboard Prism plugins for this
-
Updated
Apr 9, 2022 - Java
-
Updated
Apr 7, 2022 - HCL
After creating a custom login policy, the active identity providers are still listed from default. Same ist for MFA and 2FA, ...
From the screenshots below, you can see that the new policy is loaded after creation and reset. But only the policy itself and not the identity providers and factors:
![image](https://user-images.githubusercontent.com/9405495/143998582-86d03161-287f-4448-b0e4-feca882
-
Updated
Apr 6, 2022 - C#
-
Updated
Apr 8, 2022 - TypeScript
-
Updated
Aug 25, 2021 - Python
-
Updated
Apr 5, 2022 - TypeScript
Improve this page
Add a description, image, and links to the iam topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the iam topic, visit your repo's landing page and select "manage topics."