diff --git a/packages/core/src/awsService/accessanalyzer/vue/iamPolicyChecks.vue b/packages/core/src/awsService/accessanalyzer/vue/iamPolicyChecks.vue index fd19bd3f627..866e177eea9 100644 --- a/packages/core/src/awsService/accessanalyzer/vue/iamPolicyChecks.vue +++ b/packages/core/src/awsService/accessanalyzer/vue/iamPolicyChecks.vue @@ -15,10 +15,10 @@

Install Python 3.6+

  • - pip install cfn-policy-validator==0.0.34 + pip install cfn-policy-validator==0.0.36
  • - pip install tf-policy-validator==0.0.8 + pip install tf-policy-validator==0.0.9
  • Provide IAM Roles Credentials

    diff --git a/packages/toolkit/.changes/next-release/Feature-2fdc05d7-db85-4a4f-8af5-ec729fade8fd.json b/packages/toolkit/.changes/next-release/Feature-2fdc05d7-db85-4a4f-8af5-ec729fade8fd.json new file mode 100644 index 00000000000..9feefa5d96f --- /dev/null +++ b/packages/toolkit/.changes/next-release/Feature-2fdc05d7-db85-4a4f-8af5-ec729fade8fd.json @@ -0,0 +1,4 @@ +{ + "type": "Feature", + "description": "AccessAnalyzer: CheckNoPublicAccess custom policy check supports additional resource types." +}