Skip to main content

🧠 AWS S3 Bucket MFA Delete is not enabled - prod.logic.yaml🟒

Uses​

Test Results πŸŸ’β€‹

Generated at: 2026-02-07T12:02:46.906908697Z Open

ResultIdCondition IndexCondition TextRuntime Error
🟒test1βœ”οΈ 99βœ”οΈ isDisappeared(CA10__disappearanceTime__c)βœ”οΈ null
🟒test2βœ”οΈ 199βœ”οΈ extract('CA10__lifecycleRulesJson__c').isNotEmpty()βœ”οΈ null
🟒test3βœ”οΈ 299βœ”οΈ extract('CA10__versioningMfaDeleteEnabled__c') == falseβœ”οΈ null
🟒test4βœ”οΈ 299βœ”οΈ extract('CA10__versioningMfaDeleteEnabled__c') == falseβœ”οΈ null
🟒test5βœ”οΈ 300βœ”οΈ otherwiseβœ”οΈ null

Generation Bundle​

FileMD5
Open/ce/ca/aws/s3/bucket-mfa-delete/policy.yaml842105D322F1BB914944EA66AF83136A
Open/ce/ca/aws/s3/bucket-mfa-delete/prod.logic.yaml66D32E036E4062DD224EF51D995960ED
Open/ce/ca/aws/s3/bucket-mfa-delete/test-data.json8ADBF035F13C26CACEB4563FBFA299B2
Open/types/CA10__CaAwsBucket__c/object.extracts.yamlF56AFA293B0B19D4F39C1EBB70F4C56F

Available Commands​

repo-manager policies generate FULL /ce/ca/aws/s3/bucket-mfa-delete/prod.logic.yaml
repo-manager policies generate DEBUG /ce/ca/aws/s3/bucket-mfa-delete/prod.logic.yaml
repo-manager policies generate CAPTURE_TEST_DATA /ce/ca/aws/s3/bucket-mfa-delete/prod.logic.yaml
repo-manager policies generate TESTS /ce/ca/aws/s3/bucket-mfa-delete/prod.logic.yaml
# Execute tests
repo-manager policies test /ce/ca/aws/s3/bucket-mfa-delete/prod.logic.yaml

Content​

Open File

---
# This policy is based on CE policy ce:ca:aws:s3:bucket-mfa-delete-enabled
# We're checking the boolean field CA10__versioningMfaDeleteEnabled__c
# If the CA10__versioningStatus__c field is empty we, likely, don't have permissions
# If CA10__lifecycleRulesJson__c field has values than MFA Delete is not applicable
# It doesn't matter if versioning is enabled because remediation will enable it anyway
inputType: "CA10__CaAwsBucket__c"
testData:
- file: "test-data.json"
importExtracts:
- file: "/types/CA10__CaAwsBucket__c/object.extracts.yaml"
conditions:
# You cannot activate MFA if you have lifecycle configuration in place.
# It doesn't matter if it's enabled or not.
- status: "INAPPLICABLE"
currentStateMessage: "It's not possible to use MFA Delete with existing Lifecycle configurations."
check:
NOT_EMPTY:
arg:
EXTRACT: "CA10__lifecycleRulesJson__c"
# It doesn't matter if versioning is active or not because remediation checks
# if versioning is active and activates it if it's not
- status: "INCOMPLIANT"
currentStateMessage: "MFA delete is not enabled."
remediationMessage: "Consider enabling MFA delete on the bucket."
check:
IS_EQUAL:
left:
EXTRACT: "CA10__versioningMfaDeleteEnabled__c"
right:
BOOLEAN: false
otherwise:
status: "COMPLIANT"
currentStateMessage: "The Bucket has MFA Delete."