-
Notifications
You must be signed in to change notification settings - Fork 22
Description
Thank you for sharing those policies, very helpful. I have been playing with the check-permissions filter within the iam-user resource, trying to list a map the following: iam account --> ALlowed Actions --> Resources, but I'm stuck, and wondering if you could point me to the correct direction.
The current policy, when run, outputs a resource.yml file that contains the IAM accounts that are allowed to perform a s3:DeleteBucket action against all resources (*), but misses to list accounts that have the s3:DeleteBucket action allowed against specific resources only.
policies:
- name: iam-user-activekey-deleteBucket
resource: iam-user
filters:
- type: check-permissions
match: allowed
actions:
- s3:DeleteBucket
Am I missing something or the functionality is not there yet? Thank you very much for the help, and I apologize before hand if I posted this in the wrong place, I'm very new to github.