diff --git a/packages/core/src/awsService/accessanalyzer/vue/iamPolicyChecks.vue b/packages/core/src/awsService/accessanalyzer/vue/iamPolicyChecks.vue index fd19bd3f627..866e177eea9 100644 --- a/packages/core/src/awsService/accessanalyzer/vue/iamPolicyChecks.vue +++ b/packages/core/src/awsService/accessanalyzer/vue/iamPolicyChecks.vue @@ -15,10 +15,10 @@
Install Python 3.6+
pip install cfn-policy-validator==0.0.34
+ pip install cfn-policy-validator==0.0.36
pip install tf-policy-validator==0.0.8
+ pip install tf-policy-validator==0.0.9
Provide IAM Roles Credentials
diff --git a/packages/toolkit/.changes/next-release/Feature-2fdc05d7-db85-4a4f-8af5-ec729fade8fd.json b/packages/toolkit/.changes/next-release/Feature-2fdc05d7-db85-4a4f-8af5-ec729fade8fd.json new file mode 100644 index 00000000000..9feefa5d96f --- /dev/null +++ b/packages/toolkit/.changes/next-release/Feature-2fdc05d7-db85-4a4f-8af5-ec729fade8fd.json @@ -0,0 +1,4 @@ +{ + "type": "Feature", + "description": "AccessAnalyzer: CheckNoPublicAccess custom policy check supports additional resource types." +}