Add feature : IAM bp check
This commit is contained in:
parent
47b3f9b180
commit
c526d2571f
@ -2,22 +2,74 @@ from models import RuleCheckResult
|
||||
import boto3
|
||||
|
||||
|
||||
# client = boto3.client("")
|
||||
client = boto3.client("iam")
|
||||
|
||||
|
||||
def iam_policy_no_statements_with_admin_access():
|
||||
compliant_resource = []
|
||||
non_compliant_resources = []
|
||||
policies = client.list_policies(Scope="Local")["Policies"]
|
||||
|
||||
for policy in policies:
|
||||
policy_version = client.get_policy_version(PolicyArn=policy["Arn"], VersionId=policy["DefaultVersionId"])[
|
||||
"PolicyVersion"
|
||||
]
|
||||
|
||||
if "'Effect': 'Allow', 'Action': '*', 'Resource': '*'" not in str(policy_version["Document"]):
|
||||
compliant_resource.append(policy["Arn"])
|
||||
else:
|
||||
non_compliant_resources.append(policy["Arn"])
|
||||
|
||||
return RuleCheckResult(
|
||||
passed=False, compliant_resources=[], non_compliant_resources=[]
|
||||
passed=not non_compliant_resources,
|
||||
compliant_resources=compliant_resource,
|
||||
non_compliant_resources=non_compliant_resources,
|
||||
)
|
||||
|
||||
|
||||
def iam_policy_no_statements_with_full_access():
|
||||
compliant_resource = []
|
||||
non_compliant_resources = []
|
||||
policies = client.list_policies(Scope="Local")["Policies"]
|
||||
|
||||
for policy in policies:
|
||||
policy_version = client.get_policy_version(PolicyArn=policy["Arn"], VersionId=policy["DefaultVersionId"])[
|
||||
"PolicyVersion"
|
||||
]
|
||||
|
||||
escape = False
|
||||
for statement in policy_version["Document"]["Statement"]:
|
||||
for action in statement["Action"]:
|
||||
if action.endswith(":*"):
|
||||
non_compliant_resources.append(policy["Arn"])
|
||||
escape = True
|
||||
break
|
||||
if escape == True:
|
||||
break
|
||||
else:
|
||||
compliant_resource.append(policy["Arn"])
|
||||
|
||||
return RuleCheckResult(
|
||||
passed=False, compliant_resources=[], non_compliant_resources=[]
|
||||
passed=not non_compliant_resources,
|
||||
compliant_resources=compliant_resource,
|
||||
non_compliant_resources=non_compliant_resources,
|
||||
)
|
||||
|
||||
|
||||
def iam_role_managed_policy_check():
|
||||
compliant_resource = []
|
||||
non_compliant_resources = []
|
||||
policy_arns = [] # 검사할 managed policy arn 목록
|
||||
|
||||
for policy in policy_arns:
|
||||
response = client.list_entities_for_policy(PolicyArn=policy)
|
||||
if response["PolicyGroups"] == [] and response["PolicyUsers"] == [] and response["PolicyRoles"] == []:
|
||||
non_compliant_resources.append(policy)
|
||||
else:
|
||||
compliant_resource.append(policy)
|
||||
|
||||
return RuleCheckResult(
|
||||
passed=False, compliant_resources=[], non_compliant_resources=[]
|
||||
passed=not compliant_resource,
|
||||
compliant_resources=compliant_resource,
|
||||
non_compliant_resources=non_compliant_resources,
|
||||
)
|
||||
|
Loading…
Reference in New Issue
Block a user