feat(query): iam role without permission boundary#8020
feat(query): iam role without permission boundary#8020balaakasam wants to merge 7 commits intoCheckmarx:masterfrom
Conversation
|
Hello, just checking in on this PR. Happy to make any additional changes needed. The riskScore field has been added to the metadata as requested by the validation check. Please let me know if anything else is needed to move this forward. |
|
Hi @balaakasam, There are a couple of issues with the query’s metadata fields: the risk score should be a float with one decimal place, and the category must be one of the predefined values. Could you please update these according to the documentation? -https://docs.kics.io/latest/creating-queries/ Also, the negative and positive tests are currently identical, and neither defines a Additionally, please note that this query may still be introduced as a BETA query initially, even after these issues are addressed. BETA queries are queries that are possible to use but need further review/investigation. Once these are addressed, I’ll review the PR again and work on moving it forward. |
Closes #8019
Reason for Proposed Changes
AWS IAM permission boundaries are a critical enterprise security control that limit the maximum permissions an IAM role can have, even if broader policies are attached. Without a permission boundary, IAM roles can potentially be exploited to escalate privileges beyond intended scope.
Currently KICS does not check whether aws_iam_role resources have a permissions_boundary attribute set, which is a common misconfiguration in enterprise AWS environments.
Proposed Changes
I submit this contribution under the Apache-2.0 license.