-
Updated
Dec 17, 2021 - Python
iam
Here are 630 public repositories matching this topic...
-
Updated
Sep 7, 2021 - Shell
-
Updated
Nov 16, 2021 - Go
-
Updated
Nov 26, 2021 - Go
-
Updated
Dec 1, 2021 - Python
- There are still mentions of a triage worksheet. "Cloudsplaining identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet. It can scan all the policies in your AWS account or it can scan a single policy file." The worksheet is mentioned several times.
- As shown in the above, there is no mention of multiple AWS accounts
- The GIF st
-
Updated
Dec 19, 2021 - Go
-
Updated
Dec 3, 2021 - Python
-
Updated
Jun 21, 2019 - TypeScript
-
Updated
Dec 7, 2021 - Shell
-
Updated
Dec 16, 2021 - Java
-
Updated
Dec 15, 2021
-
Updated
Jan 24, 2021 - Java
#22 introduced a feature to guess actions that are similar to an existing policy. It currently doesn't support all actions.
Here's things I currently know are missing (comment if you find more):
- KMS:
Encrypt,Decrypt,GenerateDataKey, ... - ECR:
BatchDeleteImage,BatchGetImage, ... -
*Deregister* -
*Modify* -
*Remove* - API Gateway: (
DELETE,
running airiam recommend_groups, in MAC gives this error
`INFO:botocore.credentials:Found credentials in shared credentials file: ~/.aws/credentials
Reusing local data
INFO:root:Analyzing data for account 051349106950
INFO:root:Using the default UserOrganizer
Traceback (most recent call last):
File "/usr/local/bin/airiam", line 5, in
run()
File "/usr/local/Cellar/airiam/
-
Updated
Dec 1, 2021 - Go
-
Updated
Dec 19, 2021 - Java
-
Updated
Dec 16, 2021 - HCL
-
Updated
Aug 25, 2021 - Python
-
Updated
Dec 19, 2021 - C#
After creating a custom login policy, the active identity providers are still listed from default. Same ist for MFA and 2FA, ...
From the screenshots below, you can see that the new policy is loaded after creation and reset. But only the policy itself and not the identity providers and factors:
![image](https://user-images.githubusercontent.com/9405495/143998582-86d03161-287f-4448-b0e4-feca882
-
Updated
Dec 18, 2021 - TypeScript
-
Updated
May 28, 2020
-
Updated
Sep 28, 2021 - Python
-
Updated
Dec 15, 2021 - TypeScript
Improve this page
Add a description, image, and links to the iam topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the iam topic, visit your repo's landing page and select "manage topics."
Is your feature request related to a problem? Please describe.
As observed during #261, users can accidentally set timeouts inconsistently. A concrete example is that one can set a User facing timeout lower than any backend timeout, such that requests may fail early.
Describe the solution you'd like
We should provide some sanity checking to prevent unintended timeout behavior.