Skip to main content

🧠 AWS Account IAM Access Analyzer is not enabled for all regions - prod.logic.yaml🟒

Uses​

Test Results πŸŸ’β€‹

Generated at: 2026-02-10T22:32:28.215012463Z Open

ResultIdCondition IndexCondition TextRuntime Error
🟒test1βœ”οΈ 200βœ”οΈ otherwiseβœ”οΈ null
🟒test2βœ”οΈ 199βœ”οΈ CA10A1__AWS_IAM_Access_Analyzers__r.count(COMPLIANT) == CA10__AWS_Account_Regions__r.count(COMPLIANT)βœ”οΈ null

Generation Bundle​

FileMD5
Open/ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/policy.yaml2D33FCEDDE4BA41FA724536F3B1C8743
Open/ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml0EC599241D40FBD684F78DE275C701B6
Open/ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/test-data.json98EEF7F281AADBE8F102C11F1CDE7AB7
Open/types/CA10__CaAwsAccount__c/object.extracts.yaml926999C100E8C1066EC8BD4B82B0F362
Open/types/CA10__CaAwsAccountRegion__c/object.extracts.yamlB5D54D4844B8E77238E14E730ABEE3C4
Open/types/CA10A1__CaAwsIamAccessAnalyzer__c/object.extracts.yaml72D380FE6BF927AAF32782CD4F6277F7

Available Commands​

repo-manager policies generate FULL /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
repo-manager policies generate DEBUG /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
repo-manager policies generate CAPTURE_TEST_DATA /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
repo-manager policies generate TESTS /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml
# Execute tests
repo-manager policies test /ce/ca/aws/account/iam-external-access-analyzer-for-all-regions/prod.logic.yaml

Content​

Open File

---
inputType: "CA10__CaAwsAccount__c"
testData:
- file: test-data.json
importExtracts:
- file: /types/CA10__CaAwsAccount__c/object.extracts.yaml
conditions:
- status: "COMPLIANT"
currentStateMessage: "IAM Access Analyzer is enabled in all regions."
check:
IS_EQUAL:
left:
RELATED_LIST_COUNT:
status: "COMPLIANT"
relationshipName: "CA10A1__AWS_IAM_Access_Analyzers__r"
right:
RELATED_LIST_COUNT:
status: "COMPLIANT"
relationshipName: "CA10__AWS_Account_Regions__r"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "IAM Access Analyzer is not enabled in all regions."
remediationMessage: "Enable IAM Access Analyzer in each active region."
relatedLists:
- relationshipName: "CA10A1__AWS_IAM_Access_Analyzers__r"
importExtracts:
- file: /types/CA10A1__CaAwsIamAccessAnalyzer__c/object.extracts.yaml
conditions:
- status: "INAPPLICABLE"
currentStateMessage: "This is not an external access analyzer."
check:
AND:
args:
- NOT_EQUAL:
left:
EXTRACT: "CA10A1__type__c"
right:
TEXT: "ACCOUNT"
- NOT_EQUAL:
left:
EXTRACT: "CA10A1__type__c"
right:
TEXT: "ORGANIZATION"
- status: "COMPLIANT"
currentStateMessage: "Active IAM external access analyzer."
check:
IS_EQUAL:
left:
EXTRACT: "CA10A1__status__c"
right:
TEXT: "ACTIVE"
otherwise:
status: "INAPPLICABLE"
currentStateMessage: "There is no active IAM external access analyzer."
- relationshipName: "CA10__AWS_Account_Regions__r"
importExtracts:
- file: /types/CA10__CaAwsAccountRegion__c/object.extracts.yaml
conditions:
- status: "COMPLIANT"
currentStateMessage: "Active AWS account region."
check:
NOT_EQUAL:
left:
EXTRACT: "CA10__status__c"
right:
TEXT: "not-opted-in"
otherwise:
status: "INAPPLICABLE"
currentStateMessage: "This AWS account region is not active."