Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(terraform): Added new Terraform-AWS python IAMUserNotUsedForAccess(CKV_AWS_273) policy #3574

Merged
merged 6 commits into from
Oct 12, 2022

Conversation

akinpanw
Copy link
Contributor

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

Description

This is a check to be in line with AWS security best practices to “ensure IAM users are not defined”
AWS Access should be controlled by roles via an SSO, inline with AWS best practice. Require human users to use federation with an identity provider to access AWS using temporary credentials.

Checklist:

  • My code follows the style guidelines of this project
  • I have performed a self-review of my own code
  • I have commented my code, particularly in hard-to-understand areas
  • I have added tests that prove my feature, policy, or fix is effective and works
  • New and existing tests pass locally with my changes

@gruebel gruebel changed the title feat(terraform): Added new Terraform-AWS python IAMUserNotUsedForAccess(CKV_AWS_272) policy feat(terraform): Added new Terraform-AWS python IAMUserNotUsedForAccess(CKV_AWS_273) policy Oct 10, 2022
Copy link
Contributor

@gruebel gruebel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks for the contribution 💪

@akinpanw
Copy link
Contributor Author

The merging is blocked for this. Can someone please help take a look?

@gruebel gruebel merged commit 4b80a8b into bridgecrewio:master Oct 12, 2022
losisin pushed a commit to ignite-analytics/checkov that referenced this pull request Oct 12, 2022
…ss(CKV_AWS_273) policy (bridgecrewio#3574)

* Added new aws terraform IAMUserNotUsedForAccess python policy

* Updated ckv_aws_273 with comment from previous pull request

* fix supported_resources value

* adjust the check to fail when aws_iam_user resource found

* updated the name for IAMUserNotUsedForAccess.py

Co-authored-by: Anton Grübel <[email protected]>
losisin pushed a commit to ignite-analytics/checkov that referenced this pull request Oct 12, 2022
…ss(CKV_AWS_273) policy (bridgecrewio#3574)

* Added new aws terraform IAMUserNotUsedForAccess python policy

* Updated ckv_aws_273 with comment from previous pull request

* fix supported_resources value

* adjust the check to fail when aws_iam_user resource found

* updated the name for IAMUserNotUsedForAccess.py

Co-authored-by: Anton Grübel <[email protected]>
losisin pushed a commit to ignite-analytics/checkov that referenced this pull request Oct 12, 2022
…ss(CKV_AWS_273) policy (bridgecrewio#3574)

* Added new aws terraform IAMUserNotUsedForAccess python policy

* Updated ckv_aws_273 with comment from previous pull request

* fix supported_resources value

* adjust the check to fail when aws_iam_user resource found

* updated the name for IAMUserNotUsedForAccess.py

Co-authored-by: Anton Grübel <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants