You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I scanned the terraform file with the following configuration:
resource "aws_iam_policy" "privileged-instance-policy" {
name = "privileged-instance-policy"
description = "Provides full access to AWS services and resources."
policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
""
],
"Resource": ""
}
]
}
POLICY
}
Tell us what happened, what went wrong, and what you expected to happen.
What I Did
used command: terrascan scan -t aws -f and in the result there was no violation related to iam policy having admin privileges.
Then I used : terrascan scan -t aws -f -p pkg/policies/opa/rego/aws/aws_iam_policy.
Result: There was a violation for the above terraform configuration as expected.
The text was updated successfully, but these errors were encountered:
Description
I scanned the terraform file with the following configuration:
resource "aws_iam_policy" "privileged-instance-policy" {
name = "privileged-instance-policy"
description = "Provides full access to AWS services and resources."
policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
""
],
"Resource": ""
}
]
}
POLICY
}
Tell us what happened, what went wrong, and what you expected to happen.
What I Did
used command: terrascan scan -t aws -f and in the result there was no violation related to iam policy having admin privileges.
Then I used : terrascan scan -t aws -f -p pkg/policies/opa/rego/aws/aws_iam_policy.
Result: There was a violation for the above terraform configuration as expected.
The text was updated successfully, but these errors were encountered: