No project description provided
Project description
IAM SARIF Report
Validate your IAM Policies and SCPs with AWS Policy Validator, and convert those results into SARIF documents for reporting.
Use Me
To generate findings, iam-sarif-report makes AWS API requests. The AWS Principal you use must be allowed to use the access-analyzer:ValidatePolicy
command.
{
"Effect": "Allow",
"Action": "access-analyzer:ValidatePolicy",
"Resource": "*"
}
GitHub Action
See the action.yaml for detailed usage information.
on: [push]
jobs:
example:
permissions:
security-events: write
actions: read
contents: read
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
# setup aws access
- uses: aws-actions/configure-aws-credentials@v3
with:
role-to-assume: arn:aws:iam::111111111111:role/my-github-actions-role-test
aws-region: eu-west-1
# validate some policies, and get some SARIF back
# the action creates .sarif file for each policy in the policies directory
- uses: georgealton/iam-sarif-report@v1
with:
policies: policies/
results: results
# Public repositories / Organizations with GitHub Advanced Security
# upload sarif files using CodeQL
- uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: results
Locally
pipx run iam-sarif-report tests/data/policy_checks/policies/arn-region-not-allowed.json
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
iam-sarif-report-2.0.0.tar.gz
(54.1 kB
view hashes)
Built Distribution
Close
Hashes for iam_sarif_report-2.0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2b033f852b1618ca3c8da6904d961356ba92d16e433dbe67ec9d8cffec48c742 |
|
MD5 | ef6af1315f02a1df8538ee5fe8f9cd71 |
|
BLAKE2b-256 | d30d3c46ee862a45159a55e3791760755f25b25042d02797b6c1356aa607929f |