policy_sentry
policy_sentry copied to clipboard
IAM Least Privilege Policy Generator
This is an automated PR created because AWS IAM definitions have changed.
I would prefer to query the database as it is from aws without any overrides. But basically, while using Policy Sentry package with python, it's dynamically using to adjustment in...
## What does this PR do? This PR will avoid overriding IAM permissions access level classified by aws based on the user choice. If the end user provided an enviroment...
Hello, I'm using policy sentry in a python code to create a policy with some actions for SQS and SNS AWS services. Although I'm enabling **WriteAccessLevel** for SQS and SNS...
Evaluating a CRUD policy template with the `skip-resource-constraints:` key and the `--minimize` flag set results in an error. For example: ```yaml mode: crud name: 'Example' wildcard-only: service-read: ['s3'] service-list: ['s3']...
I've avoided conditions this far to avoid complication and I think that was the right decision. But it would make sense to make an exception for a few specific cases...
Hi, I've been reading your docs and tutorials, but I couldn't find anything around explicit deny, so I would like to see if you guys can implement it? As in:...
It's pretty unnecessary to include that in the package itself and the git history.
I am not sure if this was a conscious design decision or not. Dependent actions are always added with wildcards (*) and may not be the expected behavior. #### Example...
Hi team, I was trying to re-run this for certain templates and I'm getting some errors. This is the code I'm using as example: ``` #!/usr/bin/env python from policy_sentry.analysis.analyze import...