π§ AWS Lambda Function allows public access - prod.logic.yamlπ π’
- Contextual name: π§ prod.logic.yamlπ π’
- ID:
/ce/ca/aws/lambda/function-iam-policy-public/prod.logic.yaml - Tags:
- π’ Logic test success
- π’ Logic with test data
- π Logic without extracts
Usesβ
- π AWS Lambda Function
- π§ͺ test-data.json
Test Results π’β
Generated at: 2026-01-12T19:24:40.470427904Z Open
| Result | Id | Condition Index | Condition Text | Runtime Error |
|---|---|---|---|---|
| π’ | test1 | βοΈ 99 | βοΈ isDisappeared(CA10__disappearanceTime__c) | βοΈ null |
| π’ | test2 | βοΈ 200 | βοΈ otherwise | βοΈ null |
| π’ | test3 | βοΈ 200 | βοΈ otherwise | βοΈ null |
| π’ | test4 | βοΈ 199 | βοΈ CA10__iamPolicyExt__c .allows(EXTERNAL_PRINCIPAL, [lambda:InvokeFunction, lambda:GetFunction, lambda:UpdateFunctionCode, ... 2 elements]) | βοΈ null |
| π’ | test5 | βοΈ 199 | βοΈ CA10__iamPolicyExt__c .allows(EXTERNAL_PRINCIPAL, [lambda:InvokeFunction, lambda:GetFunction, lambda:UpdateFunctionCode, ... 2 elements]) | βοΈ null |
Generation Bundleβ
| File | MD5 | |
|---|---|---|
| Open | /ce/ca/aws/lambda/function-iam-policy-public/policy.yaml | C7539B4BB3C5E112E2E48442B2505255 |
| Open | /ce/ca/aws/lambda/function-iam-policy-public/prod.logic.yaml | 9407E795BC8640AFCAB47BA2FF09CE12 |
| Open | /ce/ca/aws/lambda/function-iam-policy-public/test-data.json | 10D864AE1CD5DE1BC0AA197B33732DD6 |
Available Commandsβ
repo-manager policies generate FULL /ce/ca/aws/lambda/function-iam-policy-public/prod.logic.yaml
repo-manager policies generate DEBUG /ce/ca/aws/lambda/function-iam-policy-public/prod.logic.yaml
repo-manager policies generate CAPTURE_TEST_DATA /ce/ca/aws/lambda/function-iam-policy-public/prod.logic.yaml
repo-manager policies generate TESTS /ce/ca/aws/lambda/function-iam-policy-public/prod.logic.yaml
# Execute tests
repo-manager policies test /ce/ca/aws/lambda/function-iam-policy-public/prod.logic.yaml
Contentβ
---
inputType: "CA10__CaAwsLambdaFunction__c"
testData:
- file: "test-data.json"
conditions:
- status: "INCOMPLIANT"
currentStateMessage: "The Lambda Function resource-based policy allows anonymous access."
remediationMessage: "Modify the function's resource-based policy to remove permissions granted to anonymous principals."
check:
AWS_POLICY_ALLOWS:
policyExtField: "CA10__iamPolicyExt__c"
widestAcceptableAccessLevel: "EXTERNAL_PRINCIPAL"
actions:
- "lambda:InvokeFunction"
- "lambda:GetFunction"
- "lambda:UpdateFunctionCode"
- "lambda:DeleteFunction"
- "lambda:GetPolicy"
otherwise:
status: "COMPLIANT"
currentStateMessage: "The Lambda Function is not publicly accessible."