You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+5
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,10 @@
1
1
# CHANGELOG
2
2
3
+
## 0.0.7 (2020-05-03)
4
+
* Added separate tab for IAM Principals
5
+
* HTML Report improvements - using tabs now
6
+
* Changed the naming of some objects to make the object naming more in line with the AWS IAM API Data Types. https://docs.aws.amazon.com/IAM/latest/APIReference/API_Types.html
7
+
3
8
## 0.0.6 (2020-05-01)
4
9
* Fix `exclude-actions` in the exclusions file - it was not being respected before.
Copy file name to clipboardExpand all lines: cloudsplaining/bin/cloudsplaining
+1-1
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@
7
7
"""
8
8
Cloudsplaining is an AWS IAM Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report with a triage worksheet.
Copy file name to clipboardExpand all lines: cloudsplaining/output/templates/guidance/glossary.md
+36
Original file line number
Diff line number
Diff line change
@@ -49,3 +49,39 @@ An IAM identity that you can create in your account that has specific permission
49
49
We are particularly interested in roles used for **compute services** - i.e., Compute Service Roles.
50
50
51
51
This definition was taken from the AWS Documentation [here](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html#iam-term-role).
There are two types of Managed Policies: AWS-managed policies and Customer-managed policies. They are described below.
56
+
57
+
Criteria for selecting Managed Policies versus Inline policies can be found in the AWS documentation [here](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html#choosing-managed-or-inline).
AWS documentation on Customer-managed policies can be found [here](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html#customer-managed-policies).
62
+
63
+
The following diagram illustrates customer managed policies. Each policy is an entity in IAM with its own Amazon Resource Name (ARN) that includes the policy name. Notice that the same policy can be attached to multiple principal entities—for example, the same DynamoDB-books-app policy is attached to two different IAM roles.
An AWS managed policy is a standalone policy that is created and administered by AWS. Standalone policy means that the policy has its own Amazon Resource Name (ARN) that includes the policy name. For example, arn:aws:iam::aws:policy/IAMReadOnlyAccess is an AWS managed policy.
70
+
71
+
AWS documentation on AWS-managed policies can be found [here](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html#aws-managed-policies).
72
+
73
+
The following diagram (taken from the AWS documentation) illustrates AWS managed policies. The diagram shows three AWS managed policies: AdministratorAccess, PowerUserAccess, and AWSCloudTrailReadOnlyAccess. Notice that a single AWS managed policy can be attached to principal entities in different AWS accounts, and to different principal entities in a single AWS account.
An inline policy is a policy that's embedded in an IAM identity (a user, group, or role). That is, the policy is an inherent part of the identity. You can create a policy and embed it in a identity, either when you create the identity or later.
80
+
81
+
AWS documentation on inline policies can be found [here](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html#inline-policies).
82
+
83
+
The following diagram illustrates inline policies. Each policy is an inherent part of the user, group, or role. Notice that two roles include the same policy (the DynamoDB-books-app policy), but they are not sharing a single policy; each role has its own copy of the policy.
Inline policies are useful if you want to maintain a strict one-to-one relationship between a policy and the identity that it's applied to. For example, you want to be sure that the permissions in a policy are not inadvertently assigned to an identity other than the one they're intended for. When you use an inline policy, the permissions in the policy cannot be inadvertently attached to the wrong identity. In addition, when you use the AWS Management Console to delete that identity, the policies embedded in the identity are deleted as well. That's because they are part of the principal entity.
Copy file name to clipboardExpand all lines: cloudsplaining/output/templates/summary/executive-summary.html
+1-1
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
<pstyle="text-align: justify">
2
-
This report contains the security assessment results from Cloudsplaining, which maps out the IAM risk landscape in a report, identifies where resource ARN constraints are not used, and identifies other risks in IAM policies like Privilege Escalation<ahref="#definition-privilege-escalation"><small>[1]</small></a>, Resource Exposure<ahref="#definition-resource-exposure"><small>[2]</small></a>, Infrastructure Modification<ahref="#definition-infrastructure-modification"><small>[3]</small></a>, and Data Exfiltration<ahref="#definition-data-exfiltration"><small>[4]</small></a>.
2
+
This report contains the security assessment results from <ahref="https://github.com/salesforce/cloudsplaining">Cloudsplaining</a>, which maps out the IAM risk landscape in a report, identifies where resource ARN constraints are not used, and identifies other risks in IAM policies like Privilege Escalation<ahref="#definition-privilege-escalation"><small>[1]</small></a>, Resource Exposure<ahref="#definition-resource-exposure"><small>[2]</small></a>, Infrastructure Modification<ahref="#definition-infrastructure-modification"><small>[3]</small></a>, and Data Exfiltration<ahref="#definition-data-exfiltration"><small>[4]</small></a>.
3
3
Remediating these issues, where necessary, will help to limit the blast radius in the case of compromised AWS credentials.
0 commit comments