|
| 1 | +# generate fake ARN |
| 2 | +# default can be specified using the following format: |
| 3 | +# {<key>?<default>} |
| 4 | +arnServiceMap: |
| 5 | + aws_iam_policy: name?fakename |
| 6 | + aws_iam_user_policy: name?fakename |
| 7 | + aws_iam_role: name?fakename |
| 8 | + aws_iam_role_policy: name |
| 9 | + aws_iam_group_policy: name |
| 10 | + aws_api_gateway_rest_api_policy: rest_api_id?fakeRestApiId |
| 11 | + aws_backup_vault_policy: backup_vault_name?fakeBackupVaultName |
| 12 | + aws_cloudwatch_event_bus_policy: event_bus_name?fakeEventBusName |
| 13 | + aws_cloudwatch_log_destination_policy: destination_name?fakeDestinationName |
| 14 | + aws_codeartifact_domain_permissions_policy: domain?fakeDomain |
| 15 | + aws_codeartifact_repository_permissions_policy: repository?fakeRepository |
| 16 | + aws_codebuild_resource_policy: fakename |
| 17 | + aws_ecr_registry_policy: fakename |
| 18 | + aws_ecr_repository_policy: repository?fakeRepositoryName |
| 19 | + aws_ecrpublic_repository_policy: repository_name?fakeRepositoryName |
| 20 | + aws_efs_file_system_policy: file_system_id?fakeFileSystemId |
| 21 | + aws_elasticsearch_domain: domain_name?fakeDomainName |
| 22 | + aws_elasticsearch_domain_policy: domain_name?fakeDomainName |
| 23 | + aws_glacier_vault: name?fakename |
| 24 | + aws_glacier_vault_lock: vault_name?fakeVaultName |
| 25 | + aws_glue_resource_policy: fakeName |
| 26 | + aws_iot_policy: name?fakename |
| 27 | + aws_kms_external_key: fakeName |
| 28 | + aws_kms_key: fakeName |
| 29 | + aws_kms_replica_external_key: fakeName |
| 30 | + aws_kms_replica_key: fakeName |
| 31 | + # aws_lambda_layer_version_permission: layer_name?fakeLayberName |
| 32 | + aws_media_store_container_policy: container_name?fakeContainerName |
| 33 | + aws_networkfirewall_resource_policy: resource_arn?fakeResourceArn |
| 34 | + aws_organizations_policy: name?fakename |
| 35 | + aws_s3_access_point: name?fakename |
| 36 | + aws_s3_bucket: bucket?fakeBucket |
| 37 | + aws_s3_bucket_policy: bucket?fakeBucket |
| 38 | + aws_s3control_access_point_policy: access_point_arn?fakeAccessPointArn |
| 39 | + aws_s3control_bucket_policy: bucket?fakeBucket |
| 40 | + aws_s3control_multi_region_access_point_policy: details.name?fakename |
| 41 | + aws_s3control_object_lambda_access_point_policy: name?fakename |
| 42 | + aws_ses_identity_policy: name?fakename |
| 43 | + aws_sns_topic: name?fakename |
| 44 | + aws_sns_topic_policy: arn?fakename |
| 45 | + aws_sqs_queue: name?fakename |
| 46 | + aws_sqs_queue_policy: fakeQueueUrl |
| 47 | + aws_ssoadmin_permission_set_inline_policy: instance_arn?fakeSSOInstanceArn |
| 48 | + aws_sagemaker_model_package_group_policy: model_package_group_name?fakeModelPackageGroupName |
| 49 | + aws_secretsmanager_secret: name?fakename |
| 50 | + aws_secretsmanager_secret_policy: secret_arn?fakeSecretArn |
| 51 | + aws_transfer_access: server_id?fakeServerId |
| 52 | + aws_transfer_user: user_name?fakeUserName |
| 53 | + aws_vpc_endpoint: fakeName |
| 54 | +# iamChecks: |
| 55 | +# - AccessAnalyzer |
| 56 | + |
| 57 | +# iamExceptions: |
| 58 | +# AccessAnalyzer: |
| 59 | +# - Arn: "arn:aws:iam::123456789012:policy/test_policy" |
| 60 | + |
| 61 | +iamPolicyAttributes: |
| 62 | + aws_iam_group_policy: policy |
| 63 | + aws_iam_policy: policy |
| 64 | + aws_iam_role: |
| 65 | + - assume_role_policy |
| 66 | + - inline_policy.policy |
| 67 | + aws_iam_role_policy: policy |
| 68 | + aws_iam_user_policy: policy |
| 69 | + aws_api_gateway_rest_api: policy #note |
| 70 | + aws_api_gateway_rest_api_policy: policy |
| 71 | + aws_backup_vault_policy: policy |
| 72 | + aws_cloudwatch_event_bus_policy: policy |
| 73 | + aws_cloudwatch_log_destination_policy: access_policy |
| 74 | + aws_cloudwatch_log_resource_policy: policy |
| 75 | + aws_codeartifact_domain_permissions_policy: policy_document |
| 76 | + aws_codeartifact_repository_permissions_policy: policy_document |
| 77 | + aws_codebuild_resource_policy: policy |
| 78 | + aws_ecr_registry_policy: policy |
| 79 | + aws_ecr_repository_policy: policy |
| 80 | + aws_ecrpublic_repository_policy: policy |
| 81 | + aws_efs_file_system_policy: policy |
| 82 | + aws_elasticsearch_domain: access_policies |
| 83 | + aws_elasticsearch_domain_policy: access_policies |
| 84 | + aws_glacier_vault: access_policy |
| 85 | + aws_glacier_vault_lock: access_policy |
| 86 | + aws_glue_resource_policy: policy |
| 87 | + aws_iot_policy: policy |
| 88 | + aws_kms_external_key: policy |
| 89 | + aws_kms_key: policy |
| 90 | + aws_kms_replica_external_key: policy |
| 91 | + aws_kms_replica_key: policy |
| 92 | + # aws_lambda_layer_version_permission: policy |
| 93 | + aws_media_store_container_policy: policy |
| 94 | + aws_networkfirewall_resource_policy: policy |
| 95 | + aws_organizations_policy: content |
| 96 | + aws_s3_access_point: policy |
| 97 | + aws_s3_bucket: policy |
| 98 | + aws_s3_bucket_policy: policy |
| 99 | + aws_s3control_access_point_policy: policy |
| 100 | + aws_s3control_bucket_policy: policy |
| 101 | + aws_s3control_multi_region_access_point_policy: details.policy |
| 102 | + aws_s3control_object_lambda_access_point_policy: policy |
| 103 | + aws_ses_identity_policy: policy |
| 104 | + aws_sns_topic: policy |
| 105 | + aws_sns_topic_policy: policy |
| 106 | + aws_sqs_queue: policy |
| 107 | + aws_sqs_queue_policy: policy |
| 108 | + aws_ssoadmin_permission_set_inline_policy: inline_policy |
| 109 | + aws_sagemaker_model_package_group_policy: resource_policy |
| 110 | + aws_secretsmanager_secret: policy |
| 111 | + aws_secretsmanager_secret_policy: policy |
| 112 | + aws_transfer_access: policy |
| 113 | + aws_transfer_user: policy |
| 114 | + aws_vpc_endpoint: policy |
| 115 | + |
| 116 | +validatePolicyResourceType: |
| 117 | + aws_s3_bucket: AWS::S3::Bucket |
| 118 | + aws_s3_bucket_policy: AWS::S3::Bucket |
| 119 | + aws_s3control_access_point_policy: AWS::S3::AccessPoint |
| 120 | + aws_s3control_multi_region_access_point_policy: AWS::S3::MultiRegionAccessPoint |
| 121 | + aws_s3control_object_lambda_access_point_policy: AWS::S3ObjectLambda::AccessPoint |
0 commit comments