Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/z0ph/aa-policy-validator
Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
https://github.com/z0ph/aa-policy-validator
access-analyzer aws iam infosec least-privilege policies
Last synced: 3 months ago
JSON representation
Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
- Host: GitHub
- URL: https://github.com/z0ph/aa-policy-validator
- Owner: z0ph
- License: mit
- Created: 2021-04-07T20:05:15.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-05-20T13:05:34.000Z (over 3 years ago)
- Last Synced: 2024-07-13T02:23:25.888Z (4 months ago)
- Topics: access-analyzer, aws, iam, infosec, least-privilege, policies
- Language: Python
- Homepage: https://zoph.me
- Size: 120 KB
- Stars: 42
- Watchers: 3
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE.txt
Awesome Lists containing this project
README
# :white_check_mark: Access Analyzer - Batch Policy Validator
This script will analyze using [AWS Access Analyzer - Policy Validation](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-policy-checks.html) all your account customer managed IAM policies.
## Usage
> ProTip :bulb: : Use AWS CloudShell to run this directly on your AWS Account
### Install
$ python3 -m pip install aa-policy-validator --user
### Run
$ python3 -m aa-policy-validator### Update
$ python3 -m pip install aa-policy-validator -U --user --no-cache-dir
## ResultsResults will be written into `/tmp/findings` folder with a `README.md` file inside.
![findings screenshot](./assets/screenshot.png)