Steampipe MCP Server →
Steampipe Hub 
Hub
  • Plugins
  • Mods
  • Docs
  • Home
PluginsModsDocsHome
Plugins
turbot/aws
GitHub Repo Stars
Overview
548
Tables
2,720
Queries
PowerpipeModsGitHub
steampipe plugin install awssteampipe plugin install aws
Get Involved
Edit on GitHubDiscuss on Slack

Query: IAM user should not have any inline or attached policies

Description

This rule ensures AWS Identity and Access Management (IAM) policies are attached only to groups or roles to control access to systems and assets.

Query

Tables used in this query:

  • aws_iam_user

Controls using this query:

  • 1.14 Ensure IAM Users Receive Permissions Only Through Groups
  • 1.15 Ensure IAM Users Receive Permissions Only Through Groups
  • 1.15 Ensure IAM Users Receive Permissions Only Through Groups
  • 1.15 Ensure IAM Users Receive Permissions Only Through Groups
  • 1.15 Ensure IAM Users Receive Permissions Only Through Groups
  • 1.15 Ensure IAM Users Receive Permissions Only Through Groups
  • 1.15 Ensure IAM Users Receive Permissions Only Through Groups
  • 2 IAM users should not have IAM policies attached
  • IAM user should not have any inline or attached policies

SQL

Steampipe
Steampipe
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of 3,000+ practitioners love to discuss Steampipe, cloud intelligence & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy