Loading controls...
Control: EC2 instance IAM role should not allow cloud log tampering access
Description
This control ensures that EC2 instance IAM roles do not allow cloud log tampering access.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.ec2_instance_no_iam_role_with_cloud_log_tampering_access
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.ec2_instance_no_iam_role_with_cloud_log_tampering_access --share
SQL
This control uses a named query:
ec2_instance_no_iam_role_with_cloud_log_tampering_access