Skip to main content

🧠 AWS SQS Queue policy allows public access - prod.logic.yaml🟒

Uses​

Test Results πŸŸ’β€‹

Generated at: 2026-04-25T12:04:02.307488781Z Open

ResultIdCondition IndexCondition TextRuntime Error
🟒test1βœ”οΈ 300βœ”οΈ otherwiseβœ”οΈ null
🟒test2βœ”οΈ 300βœ”οΈ otherwiseβœ”οΈ null
🟒test3βœ”οΈ 299βœ”οΈ CA10__policyExt__c .allows(EXTERNAL_PRINCIPAL, [sqs:ReceiveMessage, sqs:SendMessage, sqs:DeleteMessage, ... 2 elements])βœ”οΈ null
🟒test4βœ”οΈ 199βœ”οΈ CA10__policyExt__c .allows(EXTERNAL_PRINCIPAL, [sqs:SetQueueAttributes, sqs:DeleteQueue, sqs:AddPermission, ... 4 elements])βœ”οΈ null
🟒test5βœ”οΈ 199βœ”οΈ CA10__policyExt__c .allows(EXTERNAL_PRINCIPAL, [sqs:SetQueueAttributes, sqs:DeleteQueue, sqs:AddPermission, ... 4 elements])βœ”οΈ null
🟒test6βœ”οΈ 199βœ”οΈ CA10__policyExt__c .allows(EXTERNAL_PRINCIPAL, [sqs:SetQueueAttributes, sqs:DeleteQueue, sqs:AddPermission, ... 4 elements])βœ”οΈ null
🟒test7βœ”οΈ 299βœ”οΈ CA10__policyExt__c .allows(EXTERNAL_PRINCIPAL, [sqs:ReceiveMessage, sqs:SendMessage, sqs:DeleteMessage, ... 2 elements])βœ”οΈ null
🟒test8βœ”οΈ 299βœ”οΈ CA10__policyExt__c .allows(EXTERNAL_PRINCIPAL, [sqs:ReceiveMessage, sqs:SendMessage, sqs:DeleteMessage, ... 2 elements])βœ”οΈ null
🟒test9βœ”οΈ 199βœ”οΈ CA10__policyExt__c .allows(EXTERNAL_PRINCIPAL, [sqs:SetQueueAttributes, sqs:DeleteQueue, sqs:AddPermission, ... 4 elements])βœ”οΈ null
🟒test10βœ”οΈ 300βœ”οΈ otherwiseβœ”οΈ null

Generation Bundle​

FileMD5
Open/ce/ca/aws/sqs/queue-public-policy/policy.yamlF2A4166CF383A14F377FCE12BD0D82B9
Open/ce/ca/aws/sqs/queue-public-policy/prod.logic.yaml3808D589D6089C13841CC03E0DC0F23B
Open/ce/ca/aws/sqs/queue-public-policy/test-data.jsonD1F5A535A03385B293B3D8669A04732A
Open/types/CA10__CaAwsQueue__c/object.extracts.yamlC99AA06C51D1DC9FFE094C4102908EC9

Available Commands​

repo-manager policies generate FULL /ce/ca/aws/sqs/queue-public-policy/prod.logic.yaml
repo-manager policies generate DEBUG /ce/ca/aws/sqs/queue-public-policy/prod.logic.yaml
repo-manager policies generate CAPTURE_TEST_DATA /ce/ca/aws/sqs/queue-public-policy/prod.logic.yaml
repo-manager policies generate TESTS /ce/ca/aws/sqs/queue-public-policy/prod.logic.yaml
# Execute tests
repo-manager policies test /ce/ca/aws/sqs/queue-public-policy/prod.logic.yaml

Content​

Open File

---
inputType: "CA10__CaAwsQueue__c"
testData:
- file: "test-data.json"
importExtracts:
- file: "/types/CA10__CaAwsQueue__c/object.extracts.yaml"
conditions:
- status: "INCOMPLIANT"
currentStateMessage: "The queue policy grants public administrative access to the SQS queue."
remediationMessage: "Update the queue policy to remove public administrative permissions."
check:
AWS_POLICY_ALLOWS:
policyExtField: "CA10__policyExt__c"
widestAcceptableAccessLevel: "EXTERNAL_PRINCIPAL"
actions:
- "sqs:SetQueueAttributes"
- "sqs:DeleteQueue"
- "sqs:AddPermission"
- "sqs:RemovePermission"
- "sqs:PurgeQueue"
- "sqs:TagQueue"
- "sqs:UntagQueue"
- status: "INCOMPLIANT"
currentStateMessage: "The queue policy grants public access to queue messages or metadata."
remediationMessage: "Update the queue policy to restrict message and metadata access to trusted principals."
check:
AWS_POLICY_ALLOWS:
policyExtField: "CA10__policyExt__c"
widestAcceptableAccessLevel: "EXTERNAL_PRINCIPAL"
actions:
- "sqs:ReceiveMessage"
- "sqs:SendMessage"
- "sqs:DeleteMessage"
- "sqs:ChangeMessageVisibility"
- "sqs:GetQueueAttributes"
otherwise:
status: "COMPLIANT"
currentStateMessage: "The queue policy does not allow public access."