π§ AWS Account IAM Access Analyzer is not enabled for all regions - prod.logic.yamlπ’
- Contextual name: π§ prod.logic.yamlπ’
- ID:
/ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml - Tags:
- π’ Logic test success
- π’ Logic with extracts
- π’ Logic with test data
Usesβ
- π AWS Account
- π AWS Account - object.extracts.yaml
- π AWS Account Region - object.extracts.yaml
- π AWS IAM Access Analyzer - object.extracts.yaml
- π§ͺ test-data.json
Test Results π’β
Generated at: 2026-02-10T22:32:28.215012463Z Open
| Result | Id | Condition Index | Condition Text | Runtime Error |
|---|---|---|---|---|
| π’ | test1 | βοΈ 200 | βοΈ otherwise | βοΈ null |
| π’ | test2 | βοΈ 199 | βοΈ CA10A1__AWS_IAM_Access_Analyzers__r.count(COMPLIANT) == CA10__AWS_Account_Regions__r.count(COMPLIANT) | βοΈ null |
Generation Bundleβ
| File | MD5 | |
|---|---|---|
| Open | /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/policy.yaml | 2D33FCEDDE4BA41FA724536F3B1C8743 |
| Open | /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml | 0EC599241D40FBD684F78DE275C701B6 |
| Open | /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/test-data.json | 98EEF7F281AADBE8F102C11F1CDE7AB7 |
| Open | /types/CA10__CaAwsAccount__c/object.extracts.yaml | 926999C100E8C1066EC8BD4B82B0F362 |
| Open | /types/CA10__CaAwsAccountRegion__c/object.extracts.yaml | B5D54D4844B8E77238E14E730ABEE3C4 |
| Open | /types/CA10A1__CaAwsIamAccessAnalyzer__c/object.extracts.yaml | 72D380FE6BF927AAF32782CD4F6277F7 |
Available Commandsβ
repo-manager policies generate FULL /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
repo-manager policies generate DEBUG /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
repo-manager policies generate CAPTURE_TEST_DATA /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
repo-manager policies generate TESTS /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
# Execute tests
repo-manager policies test /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
Contentβ
---
inputType: "CA10__CaAwsAccount__c"
testData:
- file: test-data.json
importExtracts:
- file: /types/CA10__CaAwsAccount__c/object.extracts.yaml
conditions:
- status: "COMPLIANT"
currentStateMessage: "IAM Access Analyzer is enabled in all regions."
check:
IS_EQUAL:
left:
RELATED_LIST_COUNT:
status: "COMPLIANT"
relationshipName: "CA10A1__AWS_IAM_Access_Analyzers__r"
right:
RELATED_LIST_COUNT:
status: "COMPLIANT"
relationshipName: "CA10__AWS_Account_Regions__r"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "IAM Access Analyzer is not enabled in all regions."
remediationMessage: "Enable IAM Access Analyzer in each active region."
relatedLists:
- relationshipName: "CA10A1__AWS_IAM_Access_Analyzers__r"
importExtracts:
- file: /types/CA10A1__CaAwsIamAccessAnalyzer__c/object.extracts.yaml
conditions:
- status: "INAPPLICABLE"
currentStateMessage: "This is not an external access analyzer."
check:
AND:
args:
- NOT_EQUAL:
left:
EXTRACT: "CA10A1__type__c"
right:
TEXT: "ACCOUNT"
- NOT_EQUAL:
left:
EXTRACT: "CA10A1__type__c"
right:
TEXT: "ORGANIZATION"
- status: "COMPLIANT"
currentStateMessage: "Active IAM external access analyzer."
check:
IS_EQUAL:
left:
EXTRACT: "CA10A1__status__c"
right:
TEXT: "ACTIVE"
otherwise:
status: "INAPPLICABLE"
currentStateMessage: "There is no active IAM external access analyzer."
- relationshipName: "CA10__AWS_Account_Regions__r"
importExtracts:
- file: /types/CA10__CaAwsAccountRegion__c/object.extracts.yaml
conditions:
- status: "COMPLIANT"
currentStateMessage: "Active AWS account region."
check:
NOT_EQUAL:
left:
EXTRACT: "CA10__status__c"
right:
TEXT: "not-opted-in"
otherwise:
status: "INAPPLICABLE"
currentStateMessage: "This AWS account region is not active."