Skip to content

Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation

License

Notifications You must be signed in to change notification settings

syllogy/aa-policy-validator

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

47 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

✅ Access Analyzer - Batch Policy Validator

This script will analyze using AWS Access Analyzer - Policy Validation all your account customer managed IAM policies.

Usage

ProTip 💡 : Use AWS CloudShell to run this directly on your AWS Account

Install

    $ python3 -m pip install aa-policy-validator --user

Run

    $ python3 -m aa-policy-validator

Update

    $ python3 -m pip install aa-policy-validator -U --user --no-cache-dir

Results

Results will be written into /tmp/findings folder with a README.md file inside.

findings screenshot

About

Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation

Resources

License

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 96.8%
  • Makefile 3.2%