policy_sentry icon indicating copy to clipboard operation
policy_sentry copied to clipboard

IAM Least Privilege Policy Generator

Results 27 policy_sentry issues
Sort by recently updated
recently updated
newest added

This is an automated PR created because AWS IAM definitions have changed.

cla:signed
automation

I would prefer to query the database as it is from aws without any overrides. But basically, while using Policy Sentry package with python, it's dynamically using to adjustment in...

## What does this PR do? This PR will avoid overriding IAM permissions access level classified by aws based on the user choice. If the end user provided an enviroment...

cla:missing

Hello, I'm using policy sentry in a python code to create a policy with some actions for SQS and SNS AWS services. Although I'm enabling **WriteAccessLevel** for SQS and SNS...

Evaluating a CRUD policy template with the `skip-resource-constraints:` key and the `--minimize` flag set results in an error. For example: ```yaml mode: crud name: 'Example' wildcard-only: service-read: ['s3'] service-list: ['s3']...

I've avoided conditions this far to avoid complication and I think that was the right decision. But it would make sense to make an exception for a few specific cases...

enhancement
help wanted
discussion

Hi, I've been reading your docs and tutorials, but I couldn't find anything around explicit deny, so I would like to see if you guys can implement it? As in:...

enhancement
help wanted

It's pretty unnecessary to include that in the package itself and the git history.

cleanup

I am not sure if this was a conscious design decision or not. Dependent actions are always added with wildcards (*) and may not be the expected behavior. #### Example...

bug

Hi team, I was trying to re-run this for certain templates and I'm getting some errors. This is the code I'm using as example: ``` #!/usr/bin/env python from policy_sentry.analysis.analyze import...