diff --git a/CHANGELOG.md b/CHANGELOG.md index d7a42e90..d3254341 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,9 @@ ## Unreleased * Docker +## 0.1.4 (2020-05-26) +* Inline policies are now clearly mapped to their roles. + ## 0.1.3 (2020-05-16) * Excel/CSV export capability * Table row selection capability diff --git a/cloudsplaining/bin/version.py b/cloudsplaining/bin/version.py index 4d18218c..a9bb4e99 100644 --- a/cloudsplaining/bin/version.py +++ b/cloudsplaining/bin/version.py @@ -1,2 +1,2 @@ # pylint: disable=missing-module-docstring -__version__ = "0.1.3" +__version__ = "0.1.4" diff --git a/cloudsplaining/output/templates/summary/aws-managed.html b/cloudsplaining/output/templates/summary/aws-managed.html index 6267654a..7c04c795 100644 --- a/cloudsplaining/output/templates/summary/aws-managed.html +++ b/cloudsplaining/output/templates/summary/aws-managed.html @@ -1,10 +1,8 @@

- The following table shows a list of AWS-managed IAM Policies that are currently used in the account. -
-
- If the policy contains IAM Actions - or combinations of actions - that fall under certain risk categories - Infrastructure Modification, Privilege Escalation, Resource Exposure, or Data Exfiltration - then the number of occurrences per-policy and per-risk is included in the table. + The following table shows a list of AWS-managed IAM Policies that (1) have findings and (2) are currently used in the account. + If the policy contains IAM Actions - or combinations of actions - that fall under certain risk categories - Infrastructure Modification, Privilege Escalation, Resource Exposure, or Data Exfiltration - then the number of occurrences per-policy and per-risk is included in the table. If there are no findings for a particular policy, or if the policy is not attached to any IAM Principals, then the policy is not included in the findings.

Each of the aforementioned attributes can be used to prioritize which risks to address first. For more information, see the Prioritization Guidance and Triaging Considerations. Consider using all of the Guidance criteria when reviewing this report as well. diff --git a/cloudsplaining/output/templates/summary/customer-managed.html b/cloudsplaining/output/templates/summary/customer-managed.html index 75089ceb..29f01b35 100644 --- a/cloudsplaining/output/templates/summary/customer-managed.html +++ b/cloudsplaining/output/templates/summary/customer-managed.html @@ -1,6 +1,6 @@

- The following table shows a list of Customer created IAM Policies that are currently used in the account - both Managed Policies and Inline Policies. If the policy is an inline policy, the table indicates the IAM Principal that the inline policy is associated with. + The following table shows a list of Customer created IAM Policies that are currently used in the account - both Managed Policies and Inline Policies. If the policy is an inline policy, the table indicates the IAM Principal that the inline policy is associated with. It only includes policies that (1) have findings and (2) are currently used in the account. If the policy contains IAM Actions - or combinations of actions - that fall under certain risk categories - Infrastructure Modification, Privilege Escalation, Resource Exposure, or Data Exfiltration - then the number of occurrences per-policy and per-risk is included in the table. If there are no findings for a particular policy, or if the policy is not attached to any IAM Principals, then the policy is not included in the findings.

If the policy contains IAM Actions - or combinations of actions - that fall under certain risk categories - Infrastructure Modification, Privilege Escalation, Resource Exposure, or Data Exfiltration - then the number of occurrences per-policy and per-risk is included in the table. diff --git a/examples/files/iam-principals-example.json b/examples/files/iam-principals-example.json index ec925de4..2e641348 100644 --- a/examples/files/iam-principals-example.json +++ b/examples/files/iam-principals-example.json @@ -70,11 +70,7 @@ "PolicyType": "Inline", "ManagedBy": "Customer", "PolicyName": "EC2-IAM-example", - "GroupMembership": null, - "Actions": 5, - "PrivilegeEscalation": 0, - "DataExfiltrationActions": 0, - "PermissionsManagementActions": 3 + "GroupMembership": null }, { "Principal": "MyRole", diff --git a/examples/files/iam-report-example.html b/examples/files/iam-report-example.html index faf40db1..28cea395 100644 --- a/examples/files/iam-report-example.html +++ b/examples/files/iam-report-example.html @@ -16,6 +16,11 @@ + + +