Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -859,7 +859,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -923,7 +923,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -976,7 +976,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-al2023-nodegroup.js.snapshot/aws-cdk-eks-cluster-al2023-nodegroup-test.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"AdminRole38563C57": {
"Type": "AWS::IAM::Role",
Expand Down Expand Up @@ -966,7 +966,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1050,7 +1050,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1134,7 +1134,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1218,7 +1218,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-bottlerocket-ng.js.snapshot/aws-cdk-eks-cluster-bottlerocket-ng-test.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"AdminRole38563C57": {
"Type": "AWS::IAM::Role",
Expand Down Expand Up @@ -952,7 +952,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1036,7 +1036,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -907,7 +907,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-cluster-imported.js.snapshot/aws-cdk-eks-import-cluster-test.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/EksAdminRole1C96C514/Properties/AssumeRolePolicyDocument/Statement/0[L:316,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/EksAdminRole1C96C514/Properties/AssumeRolePolicyDocument/Statement/0[L:316,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/EksAdminRole1C96C514/Properties/AssumeRolePolicyDocument/Statement/0[L:316,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"Vpc8378EB38": {
"Type": "AWS::EC2::VPC",
Expand Down Expand Up @@ -987,7 +987,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-cluster-ipv6.js.snapshot/aws-cdk-eks-cluster-ipv6-test.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results

ec2-no-open-security-groups.guard

EC2_NO_OPEN_SECURITY_GROUPS for Type: Static
Raw output
Check was not compliant as property value [Path=/Resources/ClusterControlPlaneSecurityGroupD274242C/Properties/SecurityGroupIngress/0/CidrIpv6[L:815,C:18] Value={"Fn::Select":[0,{"Fn::GetAtt":["Vpc8378EB38","Ipv6CidrBlocks"]}]}] equal to value [Path=[L:0,C:0] Value="::/0"]. Error = [PathAwareValues are not comparable map, String]

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-cluster-ipv6.js.snapshot/aws-cdk-eks-cluster-ipv6-test.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results

iam-no-overly-permissive-passrole.guard

IAM_NO_OVERLY_PERMISSIVE_PASSROLE for Type: Static
Raw output
Check was not compliant as property value [Path=/Resources/ClusterCreationRoleDefaultPolicyE8BDFC7B/Properties/PolicyDocument/Statement/0/Resource/0[L:1051,C:8] Value={"Fn::GetAtt":["ClusterRoleFA261979","Arn"]}] equal to value [Path=[L:0,C:0] Value="*"]. Error = [PathAwareValues are not comparable map, String]
Check was not compliant as property value [Path=/Resources/ClusterCreationRoleDefaultPolicyE8BDFC7B/Properties/PolicyDocument/Statement/0/Resource/1[L:1057,C:8] Value={"Fn::GetAtt":["ClusterfargateprofiledefaultPodExecutionRole09952CFF","Arn"]}] equal to value [Path=[L:0,C:0] Value="*"]. Error = [PathAwareValues are not comparable map, String]

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-cluster-ipv6.js.snapshot/aws-cdk-eks-cluster-ipv6-test.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"AdminRole38563C57": {
"Type": "AWS::IAM::Role",
Expand Down Expand Up @@ -1822,7 +1822,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -2179,7 +2179,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -2632,7 +2632,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3085,7 +3085,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3538,7 +3538,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3865,7 +3865,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3985,7 +3985,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -4108,7 +4108,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -4228,7 +4228,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -932,7 +932,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-cluster-private-endpoint.js.snapshot/aws-cdk-eks-cluster-private-endpoint-test.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"AdminRole38563C57": {
"Type": "AWS::IAM::Role",
Expand Down Expand Up @@ -944,7 +944,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-cluster-removal-policy.js.snapshot/EksClusterRemovalPolicyStack.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results

iam-no-overly-permissive-passrole.guard

IAM_NO_OVERLY_PERMISSIVE_PASSROLE for Type: Static
Raw output
Check was not compliant as property value [Path=/Resources/ClusterCreationRoleDefaultPolicyE8BDFC7B/Properties/PolicyDocument/Statement/0/Resource/0[L:646,C:8] Value={"Fn::GetAtt":["ClusterRoleFA261979","Arn"]}] equal to value [Path=[L:0,C:0] Value="*"]. Error = [PathAwareValues are not comparable map, String]
Check was not compliant as property value [Path=/Resources/ClusterCreationRoleDefaultPolicyE8BDFC7B/Properties/PolicyDocument/Statement/0/Resource/1[L:652,C:8] Value={"Fn::GetAtt":["FargateProfileConstructPodExecutionRole03537AE0","Arn"]}] equal to value [Path=[L:0,C:0] Value="*"]. Error = [PathAwareValues are not comparable map, String]
"Resources": {
"Vpc8378EB38": {
"Type": "AWS::EC2::VPC",
Expand Down Expand Up @@ -1707,7 +1707,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-cluster.js.snapshot/aws-cdk-eks-cluster.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results

iam-no-overly-permissive-passrole.guard

IAM_NO_OVERLY_PERMISSIVE_PASSROLE for Type: Static
Raw output
Check was not compliant as property value [Path=/Resources/ClusterCreationRoleDefaultPolicyE8BDFC7B/Properties/PolicyDocument/Statement/0/Resource/0[L:833,C:8] Value={"Fn::GetAtt":["ClusterRoleFA261979","Arn"]}] equal to value [Path=[L:0,C:0] Value="*"]. Error = [PathAwareValues are not comparable map, String]
Check was not compliant as property value [Path=/Resources/ClusterCreationRoleDefaultPolicyE8BDFC7B/Properties/PolicyDocument/Statement/0/Resource/1[L:839,C:8] Value={"Fn::GetAtt":["ClusterfargateprofiledefaultPodExecutionRole09952CFF","Arn"]}] equal to value [Path=[L:0,C:0] Value="*"]. Error = [PathAwareValues are not comparable map, String]

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-cluster.js.snapshot/aws-cdk-eks-cluster.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"AdminRole38563C57": {
"Type": "AWS::IAM::Role",
Expand Down Expand Up @@ -1505,7 +1505,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1802,7 +1802,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -2224,7 +2224,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -2646,7 +2646,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3068,7 +3068,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3384,7 +3384,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3474,7 +3474,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3564,7 +3564,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3654,7 +3654,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -3780,7 +3780,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -857,7 +857,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-helm-asset.js.snapshot/aws-cdk-eks-helm-test-prev.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"AdminRole38563C57": {
"Type": "AWS::IAM::Role",
Expand Down Expand Up @@ -1001,7 +1001,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-helm-asset.js.snapshot/aws-cdk-eks-helm-test.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"AdminRole38563C57": {
"Type": "AWS::IAM::Role",
Expand Down Expand Up @@ -1001,7 +1001,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -937,7 +937,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1048,7 +1048,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1135,7 +1135,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -1183,7 +1183,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1414,7 +1414,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down Expand Up @@ -1866,7 +1866,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -1029,7 +1029,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{

Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-eks/test/integ.eks-pod-identities.js.snapshot/eks-pod-identities.template.json

View workflow job for this annotation

GitHub Actions / Security Guardian Results with resolved templates

iam-role-root-principal-needs-conditions.guard

IAM_ROLE_ROOT_PRINCIPAL_NEEDS_CONDITIONS for Type: Resolved
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards.
Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/AdminRole38563C57/Properties/AssumeRolePolicyDocument/Statement/0[L:8,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].
"Resources": {
"AdminRole38563C57": {
"Type": "AWS::IAM::Role",
Expand Down Expand Up @@ -1043,7 +1043,7 @@
{
"Ref": "AWS::Partition"
},
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
]
]
}
Expand Down

Large diffs are not rendered by default.

Loading
Loading