inspec 2.3.10 → 2.3.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +34 -13
- data/etc/plugin_filters.json +25 -0
- data/inspec.gemspec +3 -3
- data/lib/bundles/inspec-compliance/api.rb +3 -0
- data/lib/bundles/inspec-compliance/configuration.rb +3 -0
- data/lib/bundles/inspec-compliance/http.rb +3 -0
- data/lib/bundles/inspec-compliance/support.rb +3 -0
- data/lib/bundles/inspec-compliance/target.rb +3 -0
- data/lib/inspec/objects/attribute.rb +3 -0
- data/lib/inspec/plugin/v2.rb +3 -0
- data/lib/inspec/plugin/v2/filter.rb +62 -0
- data/lib/inspec/plugin/v2/installer.rb +21 -1
- data/lib/inspec/plugin/v2/loader.rb +4 -0
- data/lib/inspec/profile.rb +3 -1
- data/lib/inspec/version.rb +1 -1
- data/lib/plugins/inspec-plugin-manager-cli/lib/inspec-plugin-manager-cli/cli_command.rb +25 -3
- data/lib/plugins/inspec-plugin-manager-cli/test/functional/inspec-plugin_test.rb +65 -11
- data/lib/plugins/inspec-plugin-manager-cli/test/unit/cli_args_test.rb +5 -1
- data/lib/resources/package.rb +1 -1
- metadata +5 -253
- data/MAINTAINERS.toml +0 -52
- data/docs/.gitignore +0 -2
- data/docs/README.md +0 -41
- data/docs/dev/control-eval.md +0 -62
- data/docs/dev/filtertable-internals.md +0 -353
- data/docs/dev/filtertable-usage.md +0 -533
- data/docs/dev/integration-testing.md +0 -31
- data/docs/dev/plugins.md +0 -323
- data/docs/dsl_inspec.md +0 -354
- data/docs/dsl_resource.md +0 -100
- data/docs/glossary.md +0 -381
- data/docs/habitat.md +0 -193
- data/docs/inspec_and_friends.md +0 -114
- data/docs/matchers.md +0 -161
- data/docs/migration.md +0 -293
- data/docs/platforms.md +0 -119
- data/docs/plugin_kitchen_inspec.md +0 -60
- data/docs/plugins.md +0 -57
- data/docs/profiles.md +0 -576
- data/docs/reporters.md +0 -170
- data/docs/resources/aide_conf.md.erb +0 -86
- data/docs/resources/apache.md.erb +0 -77
- data/docs/resources/apache_conf.md.erb +0 -78
- data/docs/resources/apt.md.erb +0 -81
- data/docs/resources/audit_policy.md.erb +0 -57
- data/docs/resources/auditd.md.erb +0 -89
- data/docs/resources/auditd_conf.md.erb +0 -78
- data/docs/resources/aws_cloudtrail_trail.md.erb +0 -165
- data/docs/resources/aws_cloudtrail_trails.md.erb +0 -96
- data/docs/resources/aws_cloudwatch_alarm.md.erb +0 -101
- data/docs/resources/aws_cloudwatch_log_metric_filter.md.erb +0 -164
- data/docs/resources/aws_config_delivery_channel.md.erb +0 -111
- data/docs/resources/aws_config_recorder.md.erb +0 -96
- data/docs/resources/aws_ebs_volume.md.erb +0 -76
- data/docs/resources/aws_ebs_volumes.md.erb +0 -86
- data/docs/resources/aws_ec2_instance.md.erb +0 -122
- data/docs/resources/aws_ec2_instances.md.erb +0 -89
- data/docs/resources/aws_elb.md.erb +0 -154
- data/docs/resources/aws_elbs.md.erb +0 -252
- data/docs/resources/aws_flow_log.md.erb +0 -128
- data/docs/resources/aws_iam_access_key.md.erb +0 -139
- data/docs/resources/aws_iam_access_keys.md.erb +0 -214
- data/docs/resources/aws_iam_group.md.erb +0 -74
- data/docs/resources/aws_iam_groups.md.erb +0 -92
- data/docs/resources/aws_iam_password_policy.md.erb +0 -92
- data/docs/resources/aws_iam_policies.md.erb +0 -97
- data/docs/resources/aws_iam_policy.md.erb +0 -264
- data/docs/resources/aws_iam_role.md.erb +0 -79
- data/docs/resources/aws_iam_root_user.md.erb +0 -86
- data/docs/resources/aws_iam_user.md.erb +0 -130
- data/docs/resources/aws_iam_users.md.erb +0 -289
- data/docs/resources/aws_kms_key.md.erb +0 -187
- data/docs/resources/aws_kms_keys.md.erb +0 -99
- data/docs/resources/aws_rds_instance.md.erb +0 -76
- data/docs/resources/aws_route_table.md.erb +0 -63
- data/docs/resources/aws_route_tables.md.erb +0 -65
- data/docs/resources/aws_s3_bucket.md.erb +0 -156
- data/docs/resources/aws_s3_bucket_object.md.erb +0 -99
- data/docs/resources/aws_s3_buckets.md.erb +0 -69
- data/docs/resources/aws_security_group.md.erb +0 -323
- data/docs/resources/aws_security_groups.md.erb +0 -107
- data/docs/resources/aws_sns_subscription.md.erb +0 -140
- data/docs/resources/aws_sns_topic.md.erb +0 -79
- data/docs/resources/aws_sns_topics.md.erb +0 -68
- data/docs/resources/aws_subnet.md.erb +0 -150
- data/docs/resources/aws_subnets.md.erb +0 -142
- data/docs/resources/aws_vpc.md.erb +0 -135
- data/docs/resources/aws_vpcs.md.erb +0 -135
- data/docs/resources/azure_generic_resource.md.erb +0 -183
- data/docs/resources/azure_resource_group.md.erb +0 -294
- data/docs/resources/azure_virtual_machine.md.erb +0 -357
- data/docs/resources/azure_virtual_machine_data_disk.md.erb +0 -234
- data/docs/resources/bash.md.erb +0 -85
- data/docs/resources/bond.md.erb +0 -100
- data/docs/resources/bridge.md.erb +0 -67
- data/docs/resources/bsd_service.md.erb +0 -77
- data/docs/resources/chocolatey_package.md.erb +0 -68
- data/docs/resources/command.md.erb +0 -176
- data/docs/resources/cpan.md.erb +0 -89
- data/docs/resources/cran.md.erb +0 -74
- data/docs/resources/crontab.md.erb +0 -103
- data/docs/resources/csv.md.erb +0 -64
- data/docs/resources/dh_params.md.erb +0 -221
- data/docs/resources/directory.md.erb +0 -40
- data/docs/resources/docker.md.erb +0 -240
- data/docs/resources/docker_container.md.erb +0 -113
- data/docs/resources/docker_image.md.erb +0 -104
- data/docs/resources/docker_plugin.md.erb +0 -80
- data/docs/resources/docker_service.md.erb +0 -124
- data/docs/resources/elasticsearch.md.erb +0 -252
- data/docs/resources/etc_fstab.md.erb +0 -135
- data/docs/resources/etc_group.md.erb +0 -85
- data/docs/resources/etc_hosts.md.erb +0 -88
- data/docs/resources/etc_hosts_allow.md.erb +0 -84
- data/docs/resources/etc_hosts_deny.md.erb +0 -84
- data/docs/resources/file.md.erb +0 -543
- data/docs/resources/filesystem.md.erb +0 -51
- data/docs/resources/firewalld.md.erb +0 -117
- data/docs/resources/gem.md.erb +0 -108
- data/docs/resources/group.md.erb +0 -71
- data/docs/resources/grub_conf.md.erb +0 -111
- data/docs/resources/host.md.erb +0 -96
- data/docs/resources/http.md.erb +0 -207
- data/docs/resources/iis_app.md.erb +0 -132
- data/docs/resources/iis_site.md.erb +0 -145
- data/docs/resources/inetd_conf.md.erb +0 -104
- data/docs/resources/ini.md.erb +0 -86
- data/docs/resources/interface.md.erb +0 -68
- data/docs/resources/iptables.md.erb +0 -74
- data/docs/resources/json.md.erb +0 -73
- data/docs/resources/kernel_module.md.erb +0 -130
- data/docs/resources/kernel_parameter.md.erb +0 -63
- data/docs/resources/key_rsa.md.erb +0 -95
- data/docs/resources/launchd_service.md.erb +0 -67
- data/docs/resources/limits_conf.md.erb +0 -85
- data/docs/resources/login_defs.md.erb +0 -81
- data/docs/resources/mount.md.erb +0 -79
- data/docs/resources/mssql_session.md.erb +0 -78
- data/docs/resources/mysql_conf.md.erb +0 -109
- data/docs/resources/mysql_session.md.erb +0 -84
- data/docs/resources/nginx.md.erb +0 -89
- data/docs/resources/nginx_conf.md.erb +0 -148
- data/docs/resources/npm.md.erb +0 -78
- data/docs/resources/ntp_conf.md.erb +0 -70
- data/docs/resources/oneget.md.erb +0 -63
- data/docs/resources/oracledb_session.md.erb +0 -103
- data/docs/resources/os.md.erb +0 -153
- data/docs/resources/os_env.md.erb +0 -101
- data/docs/resources/package.md.erb +0 -130
- data/docs/resources/packages.md.erb +0 -77
- data/docs/resources/parse_config.md.erb +0 -113
- data/docs/resources/parse_config_file.md.erb +0 -148
- data/docs/resources/passwd.md.erb +0 -151
- data/docs/resources/pip.md.erb +0 -77
- data/docs/resources/port.md.erb +0 -147
- data/docs/resources/postgres_conf.md.erb +0 -89
- data/docs/resources/postgres_hba_conf.md.erb +0 -103
- data/docs/resources/postgres_ident_conf.md.erb +0 -86
- data/docs/resources/postgres_session.md.erb +0 -79
- data/docs/resources/powershell.md.erb +0 -112
- data/docs/resources/processes.md.erb +0 -119
- data/docs/resources/rabbitmq_config.md.erb +0 -51
- data/docs/resources/registry_key.md.erb +0 -197
- data/docs/resources/runit_service.md.erb +0 -67
- data/docs/resources/security_policy.md.erb +0 -57
- data/docs/resources/service.md.erb +0 -131
- data/docs/resources/shadow.md.erb +0 -267
- data/docs/resources/ssh_config.md.erb +0 -83
- data/docs/resources/sshd_config.md.erb +0 -93
- data/docs/resources/ssl.md.erb +0 -129
- data/docs/resources/sys_info.md.erb +0 -52
- data/docs/resources/systemd_service.md.erb +0 -67
- data/docs/resources/sysv_service.md.erb +0 -67
- data/docs/resources/upstart_service.md.erb +0 -67
- data/docs/resources/user.md.erb +0 -150
- data/docs/resources/users.md.erb +0 -137
- data/docs/resources/vbscript.md.erb +0 -65
- data/docs/resources/virtualization.md.erb +0 -67
- data/docs/resources/windows_feature.md.erb +0 -69
- data/docs/resources/windows_hotfix.md.erb +0 -63
- data/docs/resources/windows_task.md.erb +0 -95
- data/docs/resources/wmi.md.erb +0 -91
- data/docs/resources/x509_certificate.md.erb +0 -161
- data/docs/resources/xinetd_conf.md.erb +0 -166
- data/docs/resources/xml.md.erb +0 -95
- data/docs/resources/yaml.md.erb +0 -79
- data/docs/resources/yum.md.erb +0 -108
- data/docs/resources/zfs_dataset.md.erb +0 -63
- data/docs/resources/zfs_pool.md.erb +0 -57
- data/docs/shared/matcher_be.md.erb +0 -1
- data/docs/shared/matcher_cmp.md.erb +0 -43
- data/docs/shared/matcher_eq.md.erb +0 -3
- data/docs/shared/matcher_include.md.erb +0 -1
- data/docs/shared/matcher_match.md.erb +0 -1
- data/docs/shell.md +0 -217
- data/docs/style.md +0 -178
- data/examples/README.md +0 -8
- data/examples/custom-resource/README.md +0 -3
- data/examples/custom-resource/controls/example.rb +0 -7
- data/examples/custom-resource/inspec.yml +0 -8
- data/examples/custom-resource/libraries/batsignal.rb +0 -20
- data/examples/custom-resource/libraries/gordon.rb +0 -21
- data/examples/inheritance/README.md +0 -65
- data/examples/inheritance/controls/example.rb +0 -14
- data/examples/inheritance/inspec.yml +0 -16
- data/examples/kitchen-ansible/.kitchen.yml +0 -25
- data/examples/kitchen-ansible/Gemfile +0 -19
- data/examples/kitchen-ansible/README.md +0 -53
- data/examples/kitchen-ansible/files/nginx.repo +0 -6
- data/examples/kitchen-ansible/tasks/main.yml +0 -16
- data/examples/kitchen-ansible/test/integration/default/default.yml +0 -5
- data/examples/kitchen-ansible/test/integration/default/web_spec.rb +0 -28
- data/examples/kitchen-chef/.kitchen.yml +0 -20
- data/examples/kitchen-chef/Berksfile +0 -3
- data/examples/kitchen-chef/Gemfile +0 -19
- data/examples/kitchen-chef/README.md +0 -27
- data/examples/kitchen-chef/metadata.rb +0 -7
- data/examples/kitchen-chef/recipes/default.rb +0 -6
- data/examples/kitchen-chef/recipes/nginx.rb +0 -30
- data/examples/kitchen-chef/test/integration/default/web_spec.rb +0 -28
- data/examples/kitchen-puppet/.kitchen.yml +0 -23
- data/examples/kitchen-puppet/Gemfile +0 -20
- data/examples/kitchen-puppet/Puppetfile +0 -25
- data/examples/kitchen-puppet/README.md +0 -53
- data/examples/kitchen-puppet/manifests/site.pp +0 -33
- data/examples/kitchen-puppet/metadata.json +0 -11
- data/examples/kitchen-puppet/modules/.gitkeep +0 -0
- data/examples/kitchen-puppet/test/integration/default/web_spec.rb +0 -28
- data/examples/meta-profile/README.md +0 -37
- data/examples/meta-profile/controls/example.rb +0 -13
- data/examples/meta-profile/inspec.yml +0 -13
- data/examples/plugins/inspec-resource-lister/Gemfile +0 -12
- data/examples/plugins/inspec-resource-lister/LICENSE +0 -13
- data/examples/plugins/inspec-resource-lister/README.md +0 -62
- data/examples/plugins/inspec-resource-lister/Rakefile +0 -40
- data/examples/plugins/inspec-resource-lister/inspec-resource-lister.gemspec +0 -45
- data/examples/plugins/inspec-resource-lister/lib/inspec-resource-lister.rb +0 -16
- data/examples/plugins/inspec-resource-lister/lib/inspec-resource-lister/cli_command.rb +0 -70
- data/examples/plugins/inspec-resource-lister/lib/inspec-resource-lister/plugin.rb +0 -55
- data/examples/plugins/inspec-resource-lister/lib/inspec-resource-lister/version.rb +0 -10
- data/examples/plugins/inspec-resource-lister/test/fixtures/README.md +0 -24
- data/examples/plugins/inspec-resource-lister/test/functional/README.md +0 -18
- data/examples/plugins/inspec-resource-lister/test/functional/inspec_resource_lister_test.rb +0 -110
- data/examples/plugins/inspec-resource-lister/test/helper.rb +0 -26
- data/examples/plugins/inspec-resource-lister/test/unit/README.md +0 -17
- data/examples/plugins/inspec-resource-lister/test/unit/cli_args_test.rb +0 -64
- data/examples/plugins/inspec-resource-lister/test/unit/plugin_def_test.rb +0 -51
- data/examples/profile-attribute.yml +0 -2
- data/examples/profile-attribute/README.md +0 -14
- data/examples/profile-attribute/controls/example.rb +0 -11
- data/examples/profile-attribute/inspec.yml +0 -8
- data/examples/profile-aws/controls/iam_password_policy_expiration.rb +0 -8
- data/examples/profile-aws/controls/iam_password_policy_max_age.rb +0 -8
- data/examples/profile-aws/controls/iam_root_user_mfa.rb +0 -8
- data/examples/profile-aws/controls/iam_users_access_key_age.rb +0 -8
- data/examples/profile-aws/controls/iam_users_console_users_mfa.rb +0 -8
- data/examples/profile-aws/inspec.yml +0 -11
- data/examples/profile-azure/controls/azure_resource_group_example.rb +0 -24
- data/examples/profile-azure/controls/azure_vm_example.rb +0 -29
- data/examples/profile-azure/inspec.yml +0 -11
- data/examples/profile-sensitive/README.md +0 -29
- data/examples/profile-sensitive/controls/sensitive-failures.rb +0 -9
- data/examples/profile-sensitive/controls/sensitive.rb +0 -9
- data/examples/profile-sensitive/inspec.yml +0 -8
- data/examples/profile/README.md +0 -48
- data/examples/profile/controls/example.rb +0 -24
- data/examples/profile/controls/gordon.rb +0 -36
- data/examples/profile/controls/meta.rb +0 -36
- data/examples/profile/inspec.yml +0 -11
- data/examples/profile/libraries/gordon_config.rb +0 -59
|
@@ -1,214 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
title: About the aws_iam_access_keys Resource
|
|
3
|
-
platform: aws
|
|
4
|
-
---
|
|
5
|
-
|
|
6
|
-
# aws\_iam\_access\_keys
|
|
7
|
-
|
|
8
|
-
Use the `aws_iam_access_keys` InSpec audit resource to test properties of some or all IAM Access Keys.
|
|
9
|
-
|
|
10
|
-
To test properties of a single Access Key, use the `aws_iam_access_key` resource instead.
|
|
11
|
-
To test properties of an individual user's access keys, use the `aws_iam_user` resource.
|
|
12
|
-
|
|
13
|
-
Access Keys are closely related to AWS User resources. Use this resource to perform audits of all keys or of keys specified by criteria unrelated to any particular user.
|
|
14
|
-
|
|
15
|
-
<br>
|
|
16
|
-
|
|
17
|
-
## Availability
|
|
18
|
-
|
|
19
|
-
### Installation
|
|
20
|
-
|
|
21
|
-
This resource is distributed along with InSpec itself. You can use it automatically.
|
|
22
|
-
|
|
23
|
-
### Version
|
|
24
|
-
|
|
25
|
-
This resource first became available in v2.0.16 of InSpec.
|
|
26
|
-
|
|
27
|
-
## Syntax
|
|
28
|
-
|
|
29
|
-
An `aws_iam_access_keys` resource block uses an optional filter to select a group of access keys and then tests that group.
|
|
30
|
-
|
|
31
|
-
# Do not allow any access keys
|
|
32
|
-
describe aws_iam_access_keys do
|
|
33
|
-
it { should_not exist }
|
|
34
|
-
end
|
|
35
|
-
|
|
36
|
-
# Don't let fred have access keys, using filter argument syntax
|
|
37
|
-
describe aws_iam_access_keys.where(username: 'fred') do
|
|
38
|
-
it { should_not exist }
|
|
39
|
-
end
|
|
40
|
-
|
|
41
|
-
# Don't let fred have access keys, using filter block syntax (most flexible)
|
|
42
|
-
describe aws_iam_access_keys.where { username == 'fred' } do
|
|
43
|
-
it { should_not exist }
|
|
44
|
-
end
|
|
45
|
-
|
|
46
|
-
<br>
|
|
47
|
-
|
|
48
|
-
## Examples
|
|
49
|
-
|
|
50
|
-
The following examples show how to use this InSpec audit resource.
|
|
51
|
-
|
|
52
|
-
### Disallow access keys created more than 90 days ago
|
|
53
|
-
|
|
54
|
-
describe aws_iam_access_keys.where { created_days_ago > 90 } do
|
|
55
|
-
it { should_not exist }
|
|
56
|
-
end
|
|
57
|
-
|
|
58
|
-
<br>
|
|
59
|
-
|
|
60
|
-
## Filter Criteria
|
|
61
|
-
* `active`, `create_date`, `created_days_ago`, `created_hours_ago`, `created_with_user`, `ever_used`, `inactive`, `last_used_date`, `last_used_hours_ago`, `last_used_days_ago`, `never_used`, `user_created_date`
|
|
62
|
-
|
|
63
|
-
<br>
|
|
64
|
-
|
|
65
|
-
## Filter Examples
|
|
66
|
-
|
|
67
|
-
### active
|
|
68
|
-
|
|
69
|
-
A true / false value indicating if an Access Key is currently "Active" (the normal state) in the AWS console. See also: `inactive`.
|
|
70
|
-
|
|
71
|
-
# Check if a particular key is enabled
|
|
72
|
-
describe aws_iam_access_keys.where { active } do
|
|
73
|
-
its('access_key_ids') { should include('AKIA1234567890ABCDEF')}
|
|
74
|
-
end
|
|
75
|
-
|
|
76
|
-
### create\_date
|
|
77
|
-
|
|
78
|
-
A DateTime identifying when the Access Key was created. See also `created_days_ago` and `created_hours_ago`.
|
|
79
|
-
|
|
80
|
-
# Detect keys older than 2017
|
|
81
|
-
describe aws_iam_access_keys.where { create_date < DateTime.parse('2017-01-01') } do
|
|
82
|
-
it { should_not exist }
|
|
83
|
-
end
|
|
84
|
-
|
|
85
|
-
### created\_days\_ago, created\_hours\_ago
|
|
86
|
-
|
|
87
|
-
An integer, representing how old the access key is.
|
|
88
|
-
|
|
89
|
-
# Don't allow keys that are older than 90 days
|
|
90
|
-
describe aws_iam_access_keys.where { created_days_ago > 90 } do
|
|
91
|
-
it { should_not exist }
|
|
92
|
-
end
|
|
93
|
-
|
|
94
|
-
### created\_with\_user
|
|
95
|
-
|
|
96
|
-
A true / false value indicating if the Access Key was likely created at the same time as the user, by checking if the difference between created_date and user_created_date is less than 1 hour.
|
|
97
|
-
|
|
98
|
-
# Do not automatically create keys for users
|
|
99
|
-
describe aws_iam_access_keys.where { created_with_user } do
|
|
100
|
-
it { should_not exist }
|
|
101
|
-
end
|
|
102
|
-
|
|
103
|
-
### ever\_used
|
|
104
|
-
|
|
105
|
-
A true / false value indicating if the Access Key has ever been used, based on the last_used_date. See also: `never_used`.
|
|
106
|
-
|
|
107
|
-
# Check to see if a particular key has ever been used
|
|
108
|
-
describe aws_iam_access_keys.where { ever_used } do
|
|
109
|
-
its('access_key_ids') { should include('AKIA1234567890ABCDEF')}
|
|
110
|
-
end
|
|
111
|
-
|
|
112
|
-
### inactive
|
|
113
|
-
|
|
114
|
-
A true / false value indicating if the Access Key has been marked Inactive in the AWS console. See also: `active`.
|
|
115
|
-
|
|
116
|
-
# Don't leave inactive keys laying around
|
|
117
|
-
describe aws_iam_access_keys.where { inactive } do
|
|
118
|
-
it { should_not exist }
|
|
119
|
-
end
|
|
120
|
-
|
|
121
|
-
### last\_used\_date
|
|
122
|
-
|
|
123
|
-
A DateTime identifying when the Access Key was last used. Returns nil if the key has never been used. See also: `ever_used`, `last_used_days_ago`, `last_used_hours_ago`, and `never_used`.
|
|
124
|
-
|
|
125
|
-
# No one should do anything on Mondays
|
|
126
|
-
describe aws_iam_access_keys.where { ever_used and last_used_date.monday? } do
|
|
127
|
-
it { should_not exist }
|
|
128
|
-
end
|
|
129
|
-
|
|
130
|
-
### last\_used\_days\_ago, last\_used\_hours\_ago
|
|
131
|
-
|
|
132
|
-
An integer representing when the key was last used. See also: `ever_used`, `last_used_date`, and `never_used`.
|
|
133
|
-
|
|
134
|
-
# Don't allow keys that sit unused for more than 90 days
|
|
135
|
-
describe aws_iam_access_keys.where { last_used_days_ago > 90 } do
|
|
136
|
-
it { should_not exist }
|
|
137
|
-
end
|
|
138
|
-
|
|
139
|
-
### never\_used
|
|
140
|
-
|
|
141
|
-
A true / false value indicating if the Access Key has never been used, based on the `last_used_date`. See also: `ever_used`.
|
|
142
|
-
|
|
143
|
-
# Don't allow unused keys to lay around
|
|
144
|
-
describe aws_iam_access_keys.where { never_used } do
|
|
145
|
-
it { should_not exist }
|
|
146
|
-
end
|
|
147
|
-
|
|
148
|
-
### username
|
|
149
|
-
|
|
150
|
-
Searches for access keys owned by the named user. Each user may have zero, one, or two access keys.
|
|
151
|
-
|
|
152
|
-
describe aws_iam_access_keys(username: 'bob') do
|
|
153
|
-
it { should exist }
|
|
154
|
-
end
|
|
155
|
-
|
|
156
|
-
### user\_created\_date
|
|
157
|
-
|
|
158
|
-
The date at which the user was created.
|
|
159
|
-
|
|
160
|
-
# Users have to be a week old to have a key
|
|
161
|
-
describe aws_iam_access_keys.where { user_created_date > Date.now - 7 }
|
|
162
|
-
it { should_not exist }
|
|
163
|
-
end
|
|
164
|
-
|
|
165
|
-
<br>
|
|
166
|
-
|
|
167
|
-
## Properties
|
|
168
|
-
|
|
169
|
-
* `access_key_ids`, `entries`
|
|
170
|
-
|
|
171
|
-
## Property Examples
|
|
172
|
-
|
|
173
|
-
### access\_key\_ids
|
|
174
|
-
|
|
175
|
-
Provides a list of all access key IDs matched.
|
|
176
|
-
|
|
177
|
-
describe aws_iam_access_keys do
|
|
178
|
-
its('access_key_ids') { should include('AKIA1234567890ABCDEF') }
|
|
179
|
-
end
|
|
180
|
-
|
|
181
|
-
### entries
|
|
182
|
-
|
|
183
|
-
Provides access to the raw results of the query. This can be useful for checking counts and other advanced operations.
|
|
184
|
-
|
|
185
|
-
# Allow at most 100 access keys on the account
|
|
186
|
-
describe aws_iam_access_keys do
|
|
187
|
-
its('entries.count') { should be <= 100}
|
|
188
|
-
end
|
|
189
|
-
|
|
190
|
-
<br>
|
|
191
|
-
|
|
192
|
-
## Matchers
|
|
193
|
-
|
|
194
|
-
This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
|
|
195
|
-
|
|
196
|
-
### exists
|
|
197
|
-
|
|
198
|
-
The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
|
|
199
|
-
|
|
200
|
-
# Sally should have at least one access key
|
|
201
|
-
describe aws_iam_access_keys.where(username: 'sally') do
|
|
202
|
-
it { should exist }
|
|
203
|
-
end
|
|
204
|
-
|
|
205
|
-
# Don't let fred have access keys
|
|
206
|
-
describe aws_iam_access_keys.where(username: 'fred') do
|
|
207
|
-
it { should_not exist }
|
|
208
|
-
end
|
|
209
|
-
|
|
210
|
-
## AWS Permissions
|
|
211
|
-
|
|
212
|
-
Your [Principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/intro-structure.html#intro-structure-principal) will need the `iam:ListAccessKeys`, and `iam:ListUsers` action with Effect set to Allow.
|
|
213
|
-
|
|
214
|
-
You can find detailed documentation at [Actions, Resources, and Condition Keys for Identity And Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/list_identityandaccessmanagement.html).
|
|
@@ -1,74 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
title: About the aws_iam_group Resource
|
|
3
|
-
platform: aws
|
|
4
|
-
---
|
|
5
|
-
|
|
6
|
-
# aws\_iam\_group
|
|
7
|
-
|
|
8
|
-
Use the `aws_iam_group` InSpec audit resource to test properties of a single IAM group.
|
|
9
|
-
|
|
10
|
-
To test properties of multiple or all groups, use the `aws_iam_groups` resource.
|
|
11
|
-
|
|
12
|
-
<br>
|
|
13
|
-
|
|
14
|
-
## Availability
|
|
15
|
-
|
|
16
|
-
### Installation
|
|
17
|
-
|
|
18
|
-
This resource is distributed along with InSpec itself. You can use it automatically.
|
|
19
|
-
|
|
20
|
-
### Version
|
|
21
|
-
|
|
22
|
-
This resource first became available in v2.0.16 of InSpec.
|
|
23
|
-
|
|
24
|
-
## Syntax
|
|
25
|
-
|
|
26
|
-
An `aws_iam_group` resource block identifies a group by group name.
|
|
27
|
-
|
|
28
|
-
# Find a group by group name
|
|
29
|
-
describe aws_iam_group('mygroup') do
|
|
30
|
-
it { should exist }
|
|
31
|
-
end
|
|
32
|
-
|
|
33
|
-
# Hash syntax for group name
|
|
34
|
-
describe aws_iam_group(group_name: 'mygroup') do
|
|
35
|
-
it { should exist }
|
|
36
|
-
end
|
|
37
|
-
|
|
38
|
-
<br>
|
|
39
|
-
|
|
40
|
-
## Examples
|
|
41
|
-
|
|
42
|
-
The following examples show how to use this InSpec audit resource.
|
|
43
|
-
|
|
44
|
-
As this is the initial release of `aws_iam_group`, its limited functionality precludes examples.
|
|
45
|
-
|
|
46
|
-
<br>
|
|
47
|
-
|
|
48
|
-
## Properties
|
|
49
|
-
|
|
50
|
-
### users
|
|
51
|
-
|
|
52
|
-
Provides a list of the users that are attached to the group
|
|
53
|
-
|
|
54
|
-
describe aws_iam_group('mygroup')
|
|
55
|
-
its('users') { should include 'iam_user_name' }
|
|
56
|
-
end
|
|
57
|
-
|
|
58
|
-
<br>
|
|
59
|
-
|
|
60
|
-
## Matchers
|
|
61
|
-
|
|
62
|
-
### exists
|
|
63
|
-
|
|
64
|
-
The control will pass if a group with the given group name exists.
|
|
65
|
-
|
|
66
|
-
describe aws_iam_group('mygroup')
|
|
67
|
-
it { should exist }
|
|
68
|
-
end
|
|
69
|
-
|
|
70
|
-
## AWS Permissions
|
|
71
|
-
|
|
72
|
-
Your [Principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/intro-structure.html#intro-structure-principal) will need the `iam:GetGroup` action with Effect set to Allow.
|
|
73
|
-
|
|
74
|
-
You can find detailed documentation at [Actions, Resources, and Condition Keys for Identity And Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/list_identityandaccessmanagement.html).
|
|
@@ -1,92 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
title: About the aws_iam_groups Resource
|
|
3
|
-
platform: aws
|
|
4
|
-
---
|
|
5
|
-
|
|
6
|
-
# aws\_iam\_groups
|
|
7
|
-
|
|
8
|
-
Use the `aws_iam_groups` InSpec audit resource to test properties of all or multiple groups.
|
|
9
|
-
|
|
10
|
-
To test properties of a single group, use the `aws_iam_group` resource.
|
|
11
|
-
|
|
12
|
-
<br>
|
|
13
|
-
|
|
14
|
-
## Availability
|
|
15
|
-
|
|
16
|
-
### Installation
|
|
17
|
-
|
|
18
|
-
This resource is distributed along with InSpec itself. You can use it automatically.
|
|
19
|
-
|
|
20
|
-
### Version
|
|
21
|
-
|
|
22
|
-
This resource first became available in v2.0.16 of InSpec.
|
|
23
|
-
|
|
24
|
-
## Syntax
|
|
25
|
-
|
|
26
|
-
An `aws_iam_groups` resource block uses an optional filter to select a collection of IAM groups and then tests that collection.
|
|
27
|
-
|
|
28
|
-
# The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
|
|
29
|
-
describe aws_iam_groups do
|
|
30
|
-
it { should exist }
|
|
31
|
-
end
|
|
32
|
-
|
|
33
|
-
<br>
|
|
34
|
-
|
|
35
|
-
## Examples
|
|
36
|
-
|
|
37
|
-
The following examples show how to use this InSpec audit resource.
|
|
38
|
-
|
|
39
|
-
As this is the initial release of `aws_iam_groups`, its limited functionality precludes examples.
|
|
40
|
-
|
|
41
|
-
<br>
|
|
42
|
-
|
|
43
|
-
## Filter Criteria
|
|
44
|
-
|
|
45
|
-
### group_name
|
|
46
|
-
|
|
47
|
-
Filters the IAM groups by their group name, a string. If you know the exact group name, use `aws_iam_group` (singular) instead. This criteria may be used when you know a pattern of the name.
|
|
48
|
-
|
|
49
|
-
# Use a regex to find groups ending with 'Admins'
|
|
50
|
-
describe aws_iam_groups.where(group_name: /Admins$/) do
|
|
51
|
-
its('group_names') { should include 'FriendlyAdmins' }
|
|
52
|
-
its('group_names') { shoud_not include 'ShunnedAdmins' }
|
|
53
|
-
end
|
|
54
|
-
|
|
55
|
-
## Properties
|
|
56
|
-
|
|
57
|
-
### group_names
|
|
58
|
-
|
|
59
|
-
An Array of Strings, reflecting the IAM group names matched by the filter. If no groups matched, this will be empty. You can also use this with `aws_iam_group` to enumerate groups.
|
|
60
|
-
|
|
61
|
-
# Check for friendly people
|
|
62
|
-
describe aws_iam_groups.where(group_name: /Admins$/) do
|
|
63
|
-
its('group_names') { should include 'FriendlyAdmins' }
|
|
64
|
-
its('group_names') { should include 'KindAdmins' }
|
|
65
|
-
end
|
|
66
|
-
|
|
67
|
-
# Use to loop and fetch groups individually for auditing in detail
|
|
68
|
-
# Without a `where`, this fetches all groups
|
|
69
|
-
aws_iam_groups.group_names.each do |group_names|
|
|
70
|
-
# A roundabout way of saying "bob should not be in any groups"
|
|
71
|
-
describe aws_iam_group(group_name) do
|
|
72
|
-
its('users') { should_not include 'bob' }
|
|
73
|
-
end
|
|
74
|
-
end
|
|
75
|
-
|
|
76
|
-
## Matchers
|
|
77
|
-
|
|
78
|
-
This resource has no resource-specific matchers. For a full list of available matchers, please visit our [Universal Matchers page](https://www.inspec.io/docs/reference/matchers/).
|
|
79
|
-
|
|
80
|
-
### exists
|
|
81
|
-
|
|
82
|
-
The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
|
|
83
|
-
|
|
84
|
-
describe aws_iam_groups
|
|
85
|
-
it { should exist }
|
|
86
|
-
end
|
|
87
|
-
|
|
88
|
-
## AWS Permissions
|
|
89
|
-
|
|
90
|
-
Your [Principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/intro-structure.html#intro-structure-principal) will need the `iam:ListGroups` action with Effect set to Allow.
|
|
91
|
-
|
|
92
|
-
You can find detailed documentation at [Actions, Resources, and Condition Keys for Identity And Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/list_identityandaccessmanagement.html).
|
|
@@ -1,92 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
title: About the aws_iam_password_policy Resource
|
|
3
|
-
platform: aws
|
|
4
|
-
---
|
|
5
|
-
|
|
6
|
-
# aws\_iam\_password\_policy
|
|
7
|
-
|
|
8
|
-
Use the `aws_iam_password_policy` InSpec audit resource to test properties of the AWS IAM Password Policy.
|
|
9
|
-
|
|
10
|
-
<br>
|
|
11
|
-
|
|
12
|
-
## Availability
|
|
13
|
-
|
|
14
|
-
### Installation
|
|
15
|
-
|
|
16
|
-
This resource is distributed along with InSpec itself. You can use it automatically.
|
|
17
|
-
|
|
18
|
-
### Version
|
|
19
|
-
|
|
20
|
-
This resource first became available in v2.0.16 of InSpec.
|
|
21
|
-
|
|
22
|
-
## Syntax
|
|
23
|
-
|
|
24
|
-
An `aws_iam_password_policy` resource block takes no parameters. Several properties and matchers are available.
|
|
25
|
-
|
|
26
|
-
describe aws_iam_password_policy do
|
|
27
|
-
it { should require_lowercase_characters }
|
|
28
|
-
end
|
|
29
|
-
|
|
30
|
-
<br>
|
|
31
|
-
|
|
32
|
-
## Properties
|
|
33
|
-
|
|
34
|
-
* `max_password_age_in_days`, `minimum_password_length`, `number_of_passwords_to_remember`
|
|
35
|
-
|
|
36
|
-
## Examples
|
|
37
|
-
|
|
38
|
-
The following examples show how to use this InSpec audit resource.
|
|
39
|
-
|
|
40
|
-
### Test that the IAM Password Policy requires lowercase characters, uppercase characters, numbers, symbols, and a minimum length greater than eight
|
|
41
|
-
|
|
42
|
-
describe aws_iam_password_policy do
|
|
43
|
-
it { should require_lowercase_characters }
|
|
44
|
-
it { should require_uppercase_characters }
|
|
45
|
-
it { should require_symbols }
|
|
46
|
-
it { should require_numbers }
|
|
47
|
-
its('minimum_password_length') { should be > 8 }
|
|
48
|
-
end
|
|
49
|
-
|
|
50
|
-
### Test that the IAM Password Policy allows users to change their password
|
|
51
|
-
|
|
52
|
-
describe aws_iam_password_policy do
|
|
53
|
-
it { should allow_users_to_change_passwords }
|
|
54
|
-
end
|
|
55
|
-
|
|
56
|
-
### Test that the IAM Password Policy expires passwords
|
|
57
|
-
|
|
58
|
-
describe aws_iam_password_policy do
|
|
59
|
-
it { should expire_passwords }
|
|
60
|
-
end
|
|
61
|
-
|
|
62
|
-
### Test that the IAM Password Policy has a max password age
|
|
63
|
-
|
|
64
|
-
describe aws_iam_password_policy do
|
|
65
|
-
its('max_password_age_in_days') { should be 90 }
|
|
66
|
-
end
|
|
67
|
-
|
|
68
|
-
### Test that the IAM Password Policy prevents password reuse
|
|
69
|
-
|
|
70
|
-
describe aws_iam_password_policy do
|
|
71
|
-
it { should prevent_password_reuse }
|
|
72
|
-
end
|
|
73
|
-
|
|
74
|
-
### Test that the IAM Password Policy requires users to remember 3 previous passwords
|
|
75
|
-
|
|
76
|
-
describe aws_iam_password_policy do
|
|
77
|
-
its('number_of_passwords_to_remember') { should eq 3 }
|
|
78
|
-
end
|
|
79
|
-
|
|
80
|
-
<br>
|
|
81
|
-
|
|
82
|
-
## Matchers
|
|
83
|
-
|
|
84
|
-
This resource uses the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
|
|
85
|
-
|
|
86
|
-
* `allows_users_to_change_passwords`, `expire_passwords`, `prevent_password_reuse`, `require_lowercase_characters` , `require_uppercase_characters`, `require_numbers`, `require_symbols`
|
|
87
|
-
|
|
88
|
-
## AWS Permissions
|
|
89
|
-
|
|
90
|
-
Your [Principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/intro-structure.html#intro-structure-principal) will need the `iam:GetAccountPasswordPolicy` action with Effect set to Allow.
|
|
91
|
-
|
|
92
|
-
You can find detailed documentation at [Actions, Resources, and Condition Keys for Identity And Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/list_identityandaccessmanagement.html).
|