New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
EXPANDR-3582 Resolving AWS-IAM bug #26086
EXPANDR-3582 Resolving AWS-IAM bug #26086
Conversation
Thank you for your contribution. Your generosity and caring are unrivaled! Make sure to register your contribution by filling the Contribution Registration form, so our content wizard @samuelFain will know the proposed changes are ready to be reviewed. |
For reference: Old GCP PR: #22877. The reason why we are removing the IAM AWS tasks is, they are not able to enrich the security group owners. Only the AWS account ID is being returned associated with the security group. Any security group regardless of who created it, will always have the same aws account ID and this doesn't really help to enrich the exact owner of security group. |
Hi @capanw, your PR will be reviewed shortly. |
For the Reviewer: Successfully created a pipeline in Gitlab with url: https://code.pan.run/xsoar/content/-/pipelines/5166160 |
Hi @capanw, since your PR mostly contain changes to playbooks, it will be also reviewed by a member of our security team. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I reviewed the changes and PR is approved @samuelFain
Hello @samuelFain, Thanks for pointing it out. I updated the name of my forked repo. |
0b5b125
into
demisto:contrib/capanw_aws-iam-bug
Contributing to Cortex XSOAR Content
Make sure to register your contribution by filling the contribution registration form
The Pull Request will be reviewed only after the contribution registration form is filled.
Status
Related Issues
fixes: link to the issue
Description
Removing IAM related tasks from the AWS enrichment and remediation as we don't want to list out all the users present in the AWS account.
Screenshots
Paste here any images that will help the reviewer
Minimum version of Cortex XSOAR
Does it break backward compatibility?
Must have