Skip to main content

๐Ÿง  AWS Account does not have an IAM Password Policy - prod.logic.yaml๐ŸŸข

Usesโ€‹

Test Results ๐ŸŸขโ€‹

Generated at: 2025-12-27T12:02:02.328267671Z Open

ResultIdCondition IndexCondition TextRuntime Error
๐ŸŸข001โœ”๏ธ 199โœ”๏ธ CA10__AWS_IAM_Password_Policies__r.has(COMPLIANT)โœ”๏ธ null
๐ŸŸข002โœ”๏ธ 200โœ”๏ธ otherwiseโœ”๏ธ null

Generation Bundleโ€‹

FileMD5
Open/ce/ca/aws/iam/password-policy/policy.yamlD7BFFBB77E1FE4D8FFE4067C5C19A065
Open/ce/ca/aws/iam/password-policy/prod.logic.yaml77C226D114E650E58C45D509449D6791
Open/ce/ca/aws/iam/password-policy/test-data.json3EE40F2BF50726AA3647B3305E96EDBD
Open/types/CA10__CaAwsPasswordPolicy__c/object.extracts.yaml2C1D97EF4F574F9BE1A9C1EB7CAE6A9C

Available Commandsโ€‹

repo-manager policies generate FULL /ce/ca/aws/iam/password-policy/prod.logic.yaml
repo-manager policies generate DEBUG /ce/ca/aws/iam/password-policy/prod.logic.yaml
repo-manager policies generate CAPTURE_TEST_DATA /ce/ca/aws/iam/password-policy/prod.logic.yaml
repo-manager policies generate TESTS /ce/ca/aws/iam/password-policy/prod.logic.yaml
# Execute tests
repo-manager policies test /ce/ca/aws/iam/password-policy/prod.logic.yaml

Contentโ€‹

Open File

---
inputType: "CA10__CaAwsAccount__c"
testData:
- file: test-data.json
conditions:
- status: "COMPLIANT"
currentStateMessage: "The Account has a password policy."
check:
RELATED_LIST_HAS:
relationshipName: "CA10__AWS_IAM_Password_Policies__r"
status: "COMPLIANT"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "The Account does not have any password policy."
remediationMessage: "Create an IAM Password Policy."
relatedLists:
- relationshipName: "CA10__AWS_IAM_Password_Policies__r"
importExtracts:
- file: /types/CA10__CaAwsPasswordPolicy__c/object.extracts.yaml
conditions: []
otherwise:
status: "COMPLIANT"
currentStateMessage: "The is a password policy."